Attacks/Breaches
5/1/2012
12:20 PM
50%
50%

Mac Flashback Malware Bags Big Bucks

Analysis of the Flashback malware code estimates that botnet operators are earning $10,000 per day. Users of older Mac operating systems remain at risk.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The Flashback malware that infected hundreds of thousands of Macs was built for a single overriding purpose: profit. In fact, the developers and operators of the malware and related botnet could be raking in a cool $10,000 per day, according to researchers at Symantec, who said they're continuing to unravel what the malware can do.

By some estimates, more than 600,000 Macs were infected with Flashback, which spread using a Java vulnerability. Apple began pushing an update for that Java vulnerability less than two weeks after the Mac malware was discovered, on April 4, 2012. By the end of April, the number of reported Flashback infections had significantly decreased.

Still, Apple users were ensnared because of the six-week delay between knowledge of the Java vulnerability becoming public--owing to attackers reverse-engineering a Windows update in February 2012--and Apple releasing its own Java update that patched the flaw. "This window of opportunity helped the Flashback Trojan to infect Macs on a large scale. The Flashback authors took advantage of the gap between Oracle and Apple's patches by exploiting vulnerable websites using WordPress and Joomla to add malicious code snippets," according to a blog post from Symantec Security Response.

[ Read After Flashback, Apple Walled Gardens Won't Help. ]

Any Mac OS X user visiting a compromised site risked being infected by Flashback. In particular, Symantec said the infected sites would redirect the user's browser to a website hosting multiple Java exploits, which would use the known Java vulnerability to decrypt and install the initial Flashback Java applet. At that point, the applet would install a loader, as well as an ad-clicking component.

The ad-clicking component works with Chrome, Firefox, and Safari, and "can intercept all GET and POST requests from the browser," said Symantec. "Flashback specifically targets search queries made on Google and, depending on the search query, may redirect users to another page of the attacker's choosing, where they receive revenue from the click."

But the intended click would never reach Google. "This ultimately results in lost revenue for Google and untold sums of money for the Flashback gang," Symantec said. How much money? Based on its 2011 study of the Xpaj botnet, Symantec found that 25,000 click-fraud infections could generate up to $450 per day. "Considering the Flashback Trojan [infection] measures in the hundreds of thousands, this figure could sharply rise to the order of $10,000 per day," it said.

Although the number of Flashback infections continues to decline, Russian antivirus vendor Doctor Web, which first discovered the malware, said that older Macs remain at risk.

Overall, 63% of Flashback infections affected Macs running 10.6 (Snow Leopard), while only 11% hit users of 10.7 (Lion), which is the latest Mac operating system and accounts for 40% of all in-use OS X installations, according to NetMarketShare.

But an older Mac operating system, OS X 10.5 (Leopard), which is used by 13% of Mac users, accounted for 25%--the second highest number--of Flashback infections. Although free software can help Leopard users block Flashback, Apple is no longer shipping Leopard security updates. That puts Leopard users at greater risk of being attacked, because the Java vulnerability exploited by Flashback and SabPub will remain unpatched, and thus will likely continue to be targeted by new malware.

InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad. Take our InformationWeek IPv6 Survey now. Survey ends May 11.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.