Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Mac Flashback Malware Bags Big Bucks

Analysis of the Flashback malware code estimates that botnet operators are earning $10,000 per day. Users of older Mac operating systems remain at risk.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The Flashback malware that infected hundreds of thousands of Macs was built for a single overriding purpose: profit. In fact, the developers and operators of the malware and related botnet could be raking in a cool $10,000 per day, according to researchers at Symantec, who said they're continuing to unravel what the malware can do.

By some estimates, more than 600,000 Macs were infected with Flashback, which spread using a Java vulnerability. Apple began pushing an update for that Java vulnerability less than two weeks after the Mac malware was discovered, on April 4, 2012. By the end of April, the number of reported Flashback infections had significantly decreased.

Still, Apple users were ensnared because of the six-week delay between knowledge of the Java vulnerability becoming public--owing to attackers reverse-engineering a Windows update in February 2012--and Apple releasing its own Java update that patched the flaw. "This window of opportunity helped the Flashback Trojan to infect Macs on a large scale. The Flashback authors took advantage of the gap between Oracle and Apple's patches by exploiting vulnerable websites using WordPress and Joomla to add malicious code snippets," according to a blog post from Symantec Security Response.

[ Read After Flashback, Apple Walled Gardens Won't Help. ]

Any Mac OS X user visiting a compromised site risked being infected by Flashback. In particular, Symantec said the infected sites would redirect the user's browser to a website hosting multiple Java exploits, which would use the known Java vulnerability to decrypt and install the initial Flashback Java applet. At that point, the applet would install a loader, as well as an ad-clicking component.

The ad-clicking component works with Chrome, Firefox, and Safari, and "can intercept all GET and POST requests from the browser," said Symantec. "Flashback specifically targets search queries made on Google and, depending on the search query, may redirect users to another page of the attacker's choosing, where they receive revenue from the click."

But the intended click would never reach Google. "This ultimately results in lost revenue for Google and untold sums of money for the Flashback gang," Symantec said. How much money? Based on its 2011 study of the Xpaj botnet, Symantec found that 25,000 click-fraud infections could generate up to $450 per day. "Considering the Flashback Trojan [infection] measures in the hundreds of thousands, this figure could sharply rise to the order of $10,000 per day," it said.

Although the number of Flashback infections continues to decline, Russian antivirus vendor Doctor Web, which first discovered the malware, said that older Macs remain at risk.

Overall, 63% of Flashback infections affected Macs running 10.6 (Snow Leopard), while only 11% hit users of 10.7 (Lion), which is the latest Mac operating system and accounts for 40% of all in-use OS X installations, according to NetMarketShare.

But an older Mac operating system, OS X 10.5 (Leopard), which is used by 13% of Mac users, accounted for 25%--the second highest number--of Flashback infections. Although free software can help Leopard users block Flashback, Apple is no longer shipping Leopard security updates. That puts Leopard users at greater risk of being attacked, because the Java vulnerability exploited by Flashback and SabPub will remain unpatched, and thus will likely continue to be targeted by new malware.

InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad. Take our InformationWeek IPv6 Survey now. Survey ends May 11.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36124
PUBLISHED: 2021-05-07
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by XML External Entity (XXE) injection. An authenticated attacker can compromise the private keys of a JWT token and reuse them to manipulate the access tokens to access the platform as any desired user (clients and administrators).
CVE-2020-36125
PUBLISHED: 2021-05-07
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control where password revalidation in sensitive operations can be bypassed remotely by an authenticated attacker through requesting the endpoint directly.
CVE-2020-36126
PUBLISHED: 2021-05-07
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation. PAXSTORE marketplace endpoints allow an authenticated user to read and write data not owned by them, including third-party users, application and payment term...
CVE-2020-36127
PUBLISHED: 2021-05-07
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by an information disclosure vulnerability. Through the PUK signature functionality, an administrator will not have access to the current p12 certificate and password. When accessing this functionality, the administrator has the opt...
CVE-2020-36128
PUBLISHED: 2021-05-07
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its ...