Some details about the FlashBack trojan here:

http://www.pcmag.com/article2/0,2817,2402685,00.asp

which claims about 550,000 macs were infected. Glad to see Apple put out updates to get the latest Java installed which squashes the vulnerability. Just a bit sad that Java had been fixed in February and the patch for OSX didn't come out until this week. Maybe they didn't realize the exploit was actually being used in the wild. This also gives credence to why Apple doesn't allow 3rd party scripting and code emulators on iOS. No flash, java etc. The recent exploits were both in 3rd party code executors (Java and previously Microsoft Office scripts). It's hard to keep your platform secure when installed apps are able to execute arbitrary code of unknown origins. Info about the Office script exploit here:

http://reviews.cnet.com/8301-13727_7-57405503-263/new-exploit-uses-old-office-vulnerability-for-os-x-malware-delivery/

CB

On 4/6/12 12:44 AM, Charlie Doremus wrote:
I too was lucky to to avoid infection and found the process to check very uncomplicated.
Here are the instructions:


    Disinfection

*Manual Removal*

*Caution:* Manual disinfection is a risky process; it is recommended only for advanced users. Otherwise, please seek professional technical assistance. F-Secure customers may also contact our Support <http://www.f-secure.com/en/web/home_global/support/contact>.


*Manual Removal Instructions*

  * 1. Run the following command in Terminal:

    defaults read /Applications/Safari.app/Contents/Info LSEnvironment

  * 2. Take note of the value, DYLD_INSERT_LIBRARIES
  * 3. Proceed to step *8* if you got the following error message:

    "The domain/default pair of
    (/Applications/Safari.app/Contents/Info, LSEnvironment) does not
    exist"

  * 4. Otherwise, run the following command in Terminal:

    grep -a -o '__ldpath__[ -~]*' *%path_obtained_in_step2%*

  * 5. Take note of the value after "__ldpath__"
  * 6. Run the following commands in Terminal (first make sure there
    is only one entry, from step 2):

    sudo defaults delete /Applications/Safari.app/Contents/Info
    LSEnvironment

    sudo chmod 644 /Applications/Safari.app/Contents/Info.plist

  * 7. Delete the files obtained in steps 2 and 5
  * 8. Run the following command in Terminal:

    defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

  * 9. Take note of the result. Your system is already clean of this
    variant if you got an error message similar to the following:

    "The domain/default pair of (/Users/joe/.MacOSX/environment,
    DYLD_INSERT_LIBRARIES) does not exist"

  * 10. Otherwise, run the following command in Terminal:

    grep -a -o '__ldpath__[ -~]*' *%path_obtained_in_step9%*

  * 11. Take note of the value after "__ldpath__"
  * 12. Run the following commands in Terminal:

    defaults delete ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

    launchctl unsetenv DYLD_INSERT_LIBRARIES

  * 13. Finally, delete the files obtained in steps 9 and 11.


*Note:*

Some Flashback variants include additional components, which require additional steps to remove. Please refer to ourTrojan-Downloader:OSX/Flashback.K <http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml> description for additional information and removal instructions.

Aloha,

Charlie

Our new book "YOU MIGHT BE A MORON" is on sale at www.giantdolphin.com <http://www.giantdolphin.com> click the off the bookshelf link



On Apr 5, 2012, at 6:14 PM, Eric Oyen <[email protected] <mailto:[email protected]>> wrote:

complicated?

I found the directions over at F-Prot to be very uncomplicated. btw, I was not infected, but a room mate was.

Sophos for OS X is pretty accessible (except for the system tray icon that sits left of the apple scripts icon. I can't seem to gain access to that (or soundflower for that matter).

-eric

On Apr 5, 2012, at 9:05 PM, Ray Foret Jr wrote:

Doubtless, by now, y'all have heard of the Flash Back Trojan and the fact that 6000 Macs were most likely infected by this thing! I found that the removal process for this bugger is quite complex and is done mainly from terminal.

All I can tell you here is that you type in the following code in to terminal to see if you're infected:

defaults read /Applications/Safari.app/Contents/Info LSEnvironment defaults read /Applications/Firefox.app/Contents/Info LSEnvironment defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

IF you get back the message saying that the default pairs does not exist or something like that, you are not infected. This nasty virus desgizes itself in the form of an update to the Adobe flash player. this hit me the other day and so I decided I'd better check to see if I was infected. so far, I appear not to be. In light of this, does anybody know of a good anti virus app for the Mac which is very accessible?

Sincerely,
The Constantly Barefooted Ray!!!

Now a very proud and happy Mac user!!!

Skype name:
barefootedray

Facebook:
facebook.com/ray.foretjr.1 <http://facebook.com/ray.foretjr.1>




--
You received this message because you are subscribed to the Google Groups "MacVisionaries" group. To post to this group, send email to [email protected] <mailto:[email protected]>. To unsubscribe from this group, send email to [email protected] <mailto:[email protected]>. For more options, visit this group at http://groups.google.com/group/macvisionaries?hl=en.

--
You received this message because you are subscribed to the Google Groups "MacVisionaries" group. To post to this group, send email to [email protected] <mailto:[email protected]>. To unsubscribe from this group, send email to [email protected] <mailto:[email protected]>. For more options, visit this group at http://groups.google.com/group/macvisionaries?hl=en.

--
You received this message because you are subscribed to the Google Groups "MacVisionaries" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/macvisionaries?hl=en.

--
You received this message because you are subscribed to the Google Groups 
"MacVisionaries" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/macvisionaries?hl=en.

Reply via email to