Got Mac? Check this ASAP or else you’re in DEEP TROUBLE… (Latest malware attacks targeting Macs confirmed)

Posted: April 6, 2012 in Smartphones


Apple’s Macbooks (incarnations of classics MacBooks, MacBook Pro, and Mac Air) are promoted for countless years as the fastest and most gorgeous computer platform in the planet. More than the eye-candy visuals, it is also revered to be safest computer, since vast majority of computer viruses, worms, trojans and both, and…well, not anymore again…

According to Dr. Web (a known Russian antivirus company), there are approximately 550,000 affected Macs worldwide (550 mac-users affected in the Philippines).


Over 550 000 infected machines running Mac OS X have been a part of the botnet on April 4. These only comprise a segment of the botnet set up by means of the particular BackDoor.Flashback modification. Most infected computers reside in the United States (56.6%, or 303,449 infected hosts), Canada comes second (19.8%, or 106,379 infected computers), the third place is taken by the United Kingdom (12.8% or 68,577 cases of infection) and Australia with 6.1% (32,527 infected hosts) is the fourth.

The catch here is that one can acquire this malware not from the usual porn sites (LOL) but from at least 4 million compromised web pages. The latest incarnation of the most recent cyber attack to Mac OS X (and its predecessors) is called (Mac) Flashback, and it find its way to your system via execution of its files via Java. Note that the previous version of Flashback penetrates Mac by disguising itself as a Adobe Flash installer clone.

What’s the potential damage to you?

This malware can gather personal information about you like passwords, email addresses, contact infos, credit card numbers, and other important personal data. These stolen data are being sent to remote servers with or without your actual interaction. (This malware will also tell your mom that you are visiting porn sites)

The Million Dollar Question/s: How Will I Know I’m Affected and What Can I Do to Clean My Mac?
  • To detect if you are indeed one of those unfortunate souls affected by the malware attack, do the following
  • Dig this by clicking  Go –> Utilities –> Terminal (or type in “terminal” in search box of Spotlight)


  • Type in one by one per code string (or copy+paste per line)

defaults read /Applications/ LSEnvironment

defaults read /Applications/ LSEnvironment

defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

defaults read /Applications/Google\ LSEnvironment

  • If your Mac is clean, the commands will tell you that those domain/default pairs “does not exist.”

  •  If your Mac is infected, it will give you the patch for where that malware has installed itself on your system
If you’re infected, follow these:

  • Flashback removal steps OSX
  • Download me from Apple support
  • Make it a habit to check Apple Software updates regularly
  • Click Apple Logo —> Software Update
  • Learn your lesson and download softwares from known and trusted software makers’ sites, as well secured repositories
  • Hope this helps!

    (Cipher rejoiced like he won a lottery when he learned that his Macbook Pro is not affected by this crazy malware…)

    Credits to: Dr. Web , CNET and Apple


    Leave a Reply

    Please log in using one of these methods to post your comment: Logo

    You are commenting using your account. Log Out /  Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out /  Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out /  Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out /  Change )


    Connecting to %s