Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections
Forbes ^ | April 9, 2011 | Andy Greenberg

Posted on 04/10/2012 12:04:43 PM PDT by dickmc

Until it was revealed last week that more than half a million Macs were infected with Flashback malware, Apple had little experience working with the community of security researchers who aim to dissect and shut down botnets. And according to the firm that discovered this new outbreak, it could use a lesson in teamwork.

(Excerpt) Read more at ...

TOPICS: Business/Economy; Computers/Internet
KEYWORDS: apple; flashback; malware
Navigation: use the links below to view more comments.
first previous 1-2021-24 last
To: Swordmaker
I am still not finding ANY infected Macs... not one.

Asked around here. No one has had the problem. I asked my brother who works with a major bank on the Mac platform. His response was a simple "meh." I'm only seeing the problem here on FR amongst non-mac users. SSDD.
21 posted on 04/12/2012 11:50:16 PM PDT by PA Engineer (Time to beat the swords of government tyranny into the plowshares of freedom.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: donozark; Swordmaker; All
I checked for it with Unix via Terminal (comes with OSX). It's not on my MBP...


To see if your Mac is infected:
In Terminal:

go to SHELL / New Command

paste in the bold line below

defaults read /Applications/ LSEnvironment

-- and RUN.

You should get this error:

The domain/default pair of (/Applications/, LSEnvironment) does not exist

Then run:

defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

You should get this error:

The domain/default pair of (/Users/YOURUSER/.MacOSX/environment, DYLD_INSERT_LIBRARIES) does not exist

If you do, you are clean of this variant!


(Can't hurt anything; those are read-only commands...)

22 posted on 04/13/2012 6:00:02 AM PDT by TXnMA ("Allah": Satan's current alias...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dickmc

So a company that supposedly specializes in computer security actually is the perpetrator in this attempt to attack Macs... at least that is what this all appears to boil down to. They have been caught red handed, Apple is trying to force a shutdown of the servers playing “host” to the attack attempts.

I still say Symantec, McAfee, and others have done similar... a good way to generate business (tinfoil hat is firmly in place).

And as I have read many articles on this supposed “widespread infection” - I have actually found no actual userland reports of said infection, but lots of paranoia.

23 posted on 04/13/2012 1:44:08 PM PDT by TheBattman (Isn't the lesser evil... still evil?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Historically, Apple hasn’t had a very good relationship with security researchers. Most companies don’t. It took a long time for Microsoft to wake up and realize they essentially constitute free security research for the company.

24 posted on 04/13/2012 4:25:27 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 14 | View Replies]

Navigation: use the links below to view more comments.
first previous 1-2021-24 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson