![]() ![]() Ever since, it has exploited three distinct vulnerabilities in Java (CVE- 2011 - 3544, CVE – 2008 - 5353, and CVE – 2012 – 0507 ), the latter being patched earlier this April. The Flashback Trojan was initially spotted in September 2011, when it would pose as a Fake Flash Player installer. This Trojan has a backdoor capability (which means an attacker can seize full control of your Mac) and also tries to harvest usernames and passwords used for services such as Gmail, PayPal, and e-banking, amongst others. As the user lands on the compromised page, a piece of Javascript code loads a Java applet that exploits the locally-installed version of Java. Successful exploitation leads to the download and execution of a malicious file identified by Bitdefender as .L. Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and. The malicious code is known to be hosted on websites that advertise themselves as user-generated video services. Identified earlier last week, the Flashback.L Trojan is thought to have infected more than 6,00,000 OS X computers worldwide already by exploiting the Java runtime environment on the local machine. Bitdefender has announced a new virus scanning software that offers detection and removal for the latest e-threat affecting Mac OS X users. We had reported earlier how the Flashback trojan had infected 5,50,000 Macs worldwide but now we have some good news for Mac users. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |