Categories: Malware

Flashback botnet is still active, Mac users are warned

Intego Malware Research Team discovered that OSX Flashback trojan is still active with sinkholing activity. Mac users must be aware.

Flashback Trojan is a cyber threat known since 2011, it is a trojan horse that targeted a Java vulnerability on Mac OS X machines, early 2012 it spread to infect up to 600,000 machines as new variants were using Java exploits and drive-by downloads.  One of the most interesting analyses on the Flashback botnet was issued by Eset security firm.

The malware exploited the victims using different methods that evolved over the time:

  • Masked as a Flash player and requesting user’s authorization for execution.
  • Masked as a signed Java applet that requested user’s authorization for execution.
  • Exploiting a Java vulnerability to download without user interaction malicious code.

The data stealing mechanism implemented by the Flashback authors is the code injection web browser and other applications including Skype, with this technique the cyber crooks are able to steal user credentials other data from the victim’s machine.

The Trojan targets a known vulnerability in Java on Mac OS X systems, to infect a machine it is sufficient to visit a compromised website hosting a malicious javascript used to serve the exploit with Java applets.

Flashback creates a backdoor on the machine allowing an attacker to gain complete control of any infected system, the malware Ad-clicking feature generated millions of dollars in fraudulent ad revenue redirecting victims on sponsored links.

“Flashback specifically targets search queries made on Google and, depending on the search query, may redirect users to another page of the attacker’s choosing, where they receive revenue from the click,” Symantec wrote in a blog post. “Google never receives the intended ad click.”

The proposed scheme lets the creators implement a revenue process really profitable already implemented in similar scams. On August 2011 W32.Xpaj.B Trojan realized daily profits of $450 placing on 25,000 pc infected, proceeding with a deductive mechanism the experts estimated that with a botnet composed of 650,000 infected machines the creators of Flashback could rises a revenue of $10,000 per day.

The Flashback botnet  was also used for spamming and engaging in denial-of-service attacks.

Researchers at maltego published a blog post to alert Apple users confirming that Flashback Botnet is still active.

“The Apple Product Security Response team took serious actions in 2012 to mitigate the threat using XProtect and other security updates (including a Malware Removal Tool), however, the botnet count was only divided by six according to our sinkhole.”

“Intego purchased some of the command and control (C&C) server domain names to monitor the Flashback threat that infected hundreds of thousands of Macs. Beginning January 2, we studied those domains and our sinkhole servers recorded all connections from Macs where Flashback is still active and trying to contact the C&C servers.Below is a screenshot of the Apache Server log:”

The researchers proposed results observed after five days of sinkholing, at least 22,000 infected machines tried to contact the C&C servers and were detected 14,248 unique identifiers of the latest Flashback variants:

Version Count
sv:1 1,556
sv:2 1,813
sv:4 955
sv:5 9,924

Intego experts strongly encourage Mac users to verify the presence of Flashback on their machines and to adopt an antivirus product, unfortunately within the Mac community is widespread the wrong belief that Apple system are immune from malware

To remove Flashback from infected PC download Apple’s latest software update or use Apple’s official ‘Flashback malware removal tool‘.

Pierluigi Paganini

(Security Affairs –  Flashback, Malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

6 hours ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

10 hours ago

U.S. CISA adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration…

13 hours ago

Odido confirms massive breach; 6.2 Million customers impacted

Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID…

1 day ago

ApolloMD data breach impacts 626,540 people

A May 2025 cyberattack on ApolloMD exposed the personal data of over 626,000 patients linked…

1 day ago

LummaStealer activity spikes post-law enforcement disruption

Bitdefender reports a surge in LummaStealer activity, showing the MaaS infostealer rebounded after 2025 law…

1 day ago

This website uses cookies.