Mac OS X Flashback Trojan

Two months ago, a new variant of the Flashback Trojan started exploiting a security hole in Java to silently infect Mac OS X machines. Apple has since patched Java, but this was only on April 3rd. More than 600,000 Macs are currently infected with the Flashback Trojan, which steals your user names and passwords to popular websites by monitoring your network traffic.

To know if you were infected, run these commands:

defaults read /Applications/Safari.app/Contents/Info LSEnvironment 
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES 

If both give an error/notice that ends with “… does not exist”, you’re safe.

Over 600,000 Macs infected with Flashback Trojan →
Trojan-Downloader:OSX/Flashback.I Manual Removal →
Java for OS X Lion 2012-002 Security Update →

Published by Bramus!

Bramus is a frontend web developer from Belgium, working as a Chrome Developer Relations Engineer at Google. From the moment he discovered view-source at the age of 14 (way back in 1997), he fell in love with the web and has been tinkering with it ever since (more …)

Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.