Mac OS X Flashback Trojan Horse is still infecting Apple Computers
The Trojan horse targets a vulnerability in Java on Mac OS X system by tricking persons into visiting a compromised or malicious website with a carefully crafted Java Applet, which is used to download and execute malicious code from a remote location on the internet.
According to Intego, once a computer is infected with this Trojan horse, it will create a backdoor, which will allow hackers to access the infected computer remotely from anywhere in the world. With this access to the infected machine, hackers will be able to spy on the victim’s computer activities, steal his/her user names or passwords, use the same computer to commit other cybercrimes, or just do about anything that they want to.
Back in 2012, Apple Security team released a security update and a Flashback Trojan Removal tool to help protect uninfected computers from getting infected and to remove the threat from infected computers.
In early 2013, a few of Apple employees’ computers got infected with the same Trojan horse that took advanatage of the Java Security Bypass Zero-Day exploit, when someone at Apple visited a compromised website.
Now, almost two years after this threat was discovered, Intego has reported that at least twenty two thousand (22,000) Mac computers are infected with this dangerous Trojan horse.
How to protect yourself against the Flashback Trojan horse
To prevent your computer from getting infected or to remove this threat from computer, please download Apple’s latest software updates and the following Flashback Trojan removal tool:
Click here to download the Apple’s Flashback Trojan removal tool
Even if you think that your computer is not infected with this malware, please download and run the removal tool as a precautionary measure.
For more information about this threat, please click here.
Check the comment section below for additional information, share what you know or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
engine.
Click here help maintain Online Threat Alerts (OTA).
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Would you share this article with others? +
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews.
Advertisement
Write Your Comment, Question, Answer, or Review
NB: We will use your IP address to display your approximate location to other users.
Recommendations / Ads