A new variant of the password - stealing Flashback malware draw a bead on at Macs has emerge , which tries to set up itself after a substance abuser visits an infected site , consort to newfangled research .
Flashback , discovered by certificate seller Intego last September , is engineered to steal password for websites , including financial sites . Since its emergence , several variants have appeared showing its authors ’ innovation .
The first version of Flashback essay to trick users into installing it by masquerade as Adobe ’s Flash Player . Later versions check to see if the Apple reckoner in question had an unpatched variation of Java with two software vulnerabilities .
If the computer was tend unpatched Java , Flashback automatically instal itself . If the Java attack did n’t work , Flashback then presented itself as an Apple update with a self - signed protection certification .
Thelatest “ Flashback . N ” versionspotted by Intego tries to infect the computing machine after a person has visit an infected Web page . The tactics is often refer to as a driving force - by download . Much of the drive - by download malware for Windows can infect a electronic computer without any action by the substance abuser merely by travel to the tampered website .
Users get a bit more warning with Flashback . N. Upon hitting the infected website , Flashback . N show a “ Software Update ” dialog box similar to the legitimate Apple one and asks for a user ’s watchword .
On its web log , Intego described the installation procedure as “ somewhat odd , ” as the web site , that has been rigged to deliver the malware , displays Apple ’s multicolored spinning cogwheel for a while before the dialogue box appears . Flashback then inject itself into the Safari internet browser and starts sniffing information dealings for word .
in the first place this week , Intego set up that Flashback was using Twitter as a command - and - restraint mechanism . Other botnets have also used Twitter to post command or steering to new control .
Flashback queries Twitter for 12 - character hashtag frame of seemingly random part , accord to anIntego web log post . The drawing string are in reality generated using 128 - minute RC4 encoding and are composed of four character for the sidereal day , four for the calendar month and four for the year .