For the first time, Apple has acknowledged the outbreak of Flashback malware that has infected some 650,000 Mac computers worldwide.
The computing giant said in a support document, released late Tuesday, it is creating software to detect and eradicate the sophisticated trojan, which is capable of stealing data, hijacking search results and installing additional malware.
In addition, Apple is working with internet service providers to disable the botnet's command-and-control network, which Flashback uses to communicate with its compromised hosts.
Up until this point, Apple had remained mum on the subject, except for the release last week of two Java security updates -- for Mac OS X 10.7 (Lion) and 10.6 (Snow Leopard), which patched the vulnerability being used to spread Flashback.
For users still running 10.5 and earlier versions, Apple suggested they turn off Java functionality through their browser preferences.
Flashback was able to spread because Apple took weeks to patch its iteration of Java, despite Oracle issuing security updates for the software in February.
The number of computers botted with Flasback appeared to peak over the weekend, but experts said the botnet is still functioning normally.
This article originally appeared at scmagazineus.com
Copyright © SC Magazine, US edition
Issue: 322 | December 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.