Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
16.1K views | +0 today
Follow
Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Apple-Targeting Flashback Botnet Still Kicking, But Shrinking By 100,000 Macs Per Week - Forbes

Apple-Targeting Flashback Botnet Still Kicking, But Shrinking By 100,000 Macs Per Week - Forbes | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Dr. Web's count of Macs actively infected with Flashback over time. The "A" marks Apple's release of its Flashback removal tool, and the "B" marks Dr. Web's discovery of another variant of Flashback that led to an increase in its infection count.

 

===> Flashback has been used for click fraud, as detailed by Symantec’s researchers. The malware redirected traffic from Google search ads to its own pay-per-click ads, generating as much as $10,000 a day. <===

 

Even with its command and control servers disabled, the infected machines continue to engage in that traffic-hijacking. And with nearly half a million users still infected, Flashback’s authors are still likely profiting from their scheme.

 

Read more...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Dr. Web's chief executive Boris Sharov, who says Apple never responded when the firm shared its findings on the Flashback botnet.

 

“They told the registrar this [domain] is involved in a malicious scheme. Which would be true if we weren’t the ones controlling it and not doing any harm to users,” says Sharov. “This seems to mean that Apple is not considering our work as a help. It’s just annoying them.”

 

No comment yet.