Apple will develop software that will detect and remove the Flashback malware that was estimated to have impacted around 600,000 Macs.
The Flashback malware exploited a security flaw in Java to install itself on Macs and also relied on computer servers hosted by the malware authors to perform many of its critical functions.
Apple confirmed it was working with ISPs globally to disable the command and control network, and released a patch at the start of April that fixed the Java security flaw for systems running OS X v10.7 and Mac OS X v10.6.
Research by Kaspersky Lab found that the size of the Flashback botnet decreased over the Easter weekend to around 237,000, although it said that this does not indicate that it is shrinking rapidly.
Symantec claimed the botnet had reached its size by using vulnerabilities such as the Oracle Java SE Remote Java Runtime Environment Denial Of Service vulnerability (CVE-2012-0507, which was patched by Windows in February) to spread the malware through exploit kits such as Blackhole.
Doctor Web, which discovered the botnet, said a distinct difference with Flashback is that the malware can switch between several servers for better load balancing and, after receiving a reply from a control server, verifies its RSA signature and, if successful, downloads and runs payload on the infected machine.
Each infected bot includes a unique ID of the infected machine into the query string it sends to a control server. Doctor Web's analysts employed the sinkhole technology to redirect the botnet traffic to their own servers and thus were able to count infected hosts.
Kaspersky has released a free removal tool this week for Flashback. Users can check if they are infected by visiting Kaspersky Lab's safe verification site and can remove the malware using the Kaspersky Flashfake Removal Tool.
This article originally appeared at scmagazineuk.com
Copyright © SC Magazine, UK edition
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.