Mac Flashback Trojan horse masquerades as Flash Player installer package – Intego Security Memo
Posted on by Peter James
Risk: Low; this malware has been found in the wild, and may fool Mac users who don’t have Flash Player installed. However, Intego so far has only one report of this malware, and a sample provided by a user who downloaded it from a malicious web site.
Description: Intego has discovered a new Trojan horse, Flashback, which masquerades as a Flash Player installer. This Trojan horse has been found in the wild, and has some disturbing actions.
Users visiting certain malicious websites may see a link or an icon to download and install Flash Player. Since Mac OS X Lion does not include Flash Player, some users may be fooled and think this is a real installation link. When they click the link, an installation package downloads, and, if the user is using Safari as their web browser, the Mac OS X Installer will launch. (Safari considers installer packages, with .pkg or .mpkg extensions, to be “safe” files and will launch them after download, if default settings are used.)
For now, Intego has analyzed this malware and its installation process. Intego’s security researchers are analyzing the injected code and we will issue more information as soon as possible.
Means of protection: Users should not download a Flash Player installer from any site other than adobe.com. Mac OS X Lion does not include Flash Player, but users who wish to install this software should visit Adobe’s website: https://get.adobe.com/flashplayer/.
UPDATE: As of 2020, it is no longer advisable to download Flash Player, period.
Next, it is advisable, for those who use Safari as their web browser, to uncheck Open “safe” files after downloading in the program’s General preferences. This will prevent installer packages—whether real or malicious—from launching automatically.
Finally, if an installer claiming to be a Flash Player installer appears, users should be very careful to ensure that they did, indeed, download it from Adobe’s web site. If not, they should quit the installer.
VirusBarrier X6 (www.intego.com/virusbarrier/) protects users from this malware with malware definitions dated September 26, 2011 or later. VirusBarrier X6’s real-time scanner will detect the file when it is downloaded, and its Anti-Spyware protection will block any connections to remote servers if a user has installed the Trojan horse.
Note: if anyone who has been infected by this Trojan horse knows the URL at which they got it, can you please send an e-mail to [email protected]? Thanks.