OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac
Jump to navigation
Jump to search
(Publication) Google search: [1]
OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac | |
---|---|
Botnet | Flashback |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-19 |
Editor/Conference | ESET |
Link | http://www.eset.com/us/resources/white-papers/osx flashback.pdf (Archive copy) |
Author | Pierre-Marc Bureau |
Type | White paper |
Abstract
“ The Apple OS X operating system, like all operating systems, can become a
victim of malicious software. Before OSX/Flashback there had been a few documented cases of malware targeting OS X, but so far OSX/Flashback has claimed the greatest number of victims. In this article we describe the most interesting technical characteristics of this threat, particularly its method of spying on network communications and its algorithms for dynamically generating domain names. We also summarize the significant timeline milestones of this malware whose life cycle has persisted over several months.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR2038, editor = {ESET}, author = {Pierre-Marc Bureau}, title = {OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac}, date = {19}, month = Sep, year = {2012}, howpublished = {\url{http://www.eset.com/us/resources/white-papers/osx_flashback.pdf}}, }