iPhone Rollout On More Networks, Flashback Trojan Gets Aggressive

More regional U.S. wireless carriers have announced this week the availability of the iPhone. nTelos Wireless in Virginia, Appalachian Wireless in Kentucky, Cellcom in Wisconsin and Alaska Communications have announced they are getting the iPhone. Looks like April 20 is the start date for all of those networks.
The annoying Flashback trojan, a rare piece of malware that can infect Macs, became a little more dangerous for a short time this week when it appeared as part of a Java exploit. Formerly the trojan only appeared in obviously untrustworthy downloads on sketchy web sites. This exploit allowed Macs to become infected be simply visiting a malicious web site — though no web sites were mentioned in any of the reports. Apple responded immediately this week with a Java patch you can get by simply running Software Update. Another trojan surfaced last week that relied on the user having an older version of Microsoft Word and downloading a suspicious file. As always, of the easiest and most effective ways to protect yourself against malware is to keep your Mac and all of your software updated. Check out MacMost’s Mac Virus and Malware Information Center.

Comments: 10 Responses to “iPhone Rollout On More Networks, Flashback Trojan Gets Aggressive”

    Bill C.
    4/5/12 @ 11:17 am

    I immediately checked for the Software Update upon reading this. My updates are current. Upon checking the Java patch link, it shows it’s only for Lion. Does this mean the exploit doesn’t affect older systems? I can get the exploit by “simply visiting a malicious website”? Wouldn’t I have to download/run it before being infected?
    Thanks for keeping us informed. I rely heavily on your vast knowledge of all things Mac.

      4/5/12 @ 11:32 am

      It should be for Lion and Snow Leopard (I thought I read that, anyway). Do you have Snow Leopard? Not sure what the exact Java vulnerability is — perhaps the Java in Leopard and before isn’t susceptible, or it could be that that version of Flashback doesn’t work on older systems.

      4/5/12 @ 7:07 pm

      Gizmodo has come out with an article explaining how to check if your mac has been infected:

        4/5/12 @ 7:13 pm

        Keep in mind that that 600,000 number is almost certainly complete fiction. There’s no way for them to know that, and it was probably made up to get headlines and publicity for that company.

    Bill C.
    4/5/12 @ 12:23 pm

    I’m still on Leopard, late 2008 15″ Macbook Pro, Gary. It has been almost flawless, except for a snafu with a wifi printer install, for 3 years. I go with the old adage, if it ain’t broke don’t fix it. I suppose I would upgrade to a newer OS if Apple stopped supporting my current OS.


    Bill C.
    4/5/12 @ 1:35 pm

    You were correct, Gary. I just found another article stating it is also for Snow Leopard, Mac OS X v10.6.8.

    Tim Ohara
    4/5/12 @ 8:42 pm

    Hi Gary, I always view your website and I learn a lot! (Thank you) I have Mac Book Air Fall 2011 w/Lion
    Now, I immediately checked for the Software Update upon reading this. I ran updates program and the system indicated that it is current. But I don’t remember I received any Java patch update last 7 days from the Apple. Is this mean that my Mac Book Air has the Java patch already? Thank you. Tim

      4/5/12 @ 9:39 pm

      You can always check. Run Software Update and then go to Software Update, Preferences. You can see a list of every update you have installed.

    Apple user
    4/6/12 @ 7:20 am

    Does this flashback trojan affect iPhones and/or iPads?

Comments Closed.