|21 Apr 2012||#1|
| || |
Analysis: Flashback Spread Via Social Engineering, Then Java Exploits
Kaspersky Lab‘s latest analysis of the Mac OS X Flashback botnet reveals that the botnet's malware was spread via drive-by downloads on hacked WordPress web sites.
From September 2011 until February 2012, the Flashback creators distributed the trojan through compromised WordPress sites that prompted users to download various iterations of a fake Adobe Flash Player update that was, in actuality, the Mac trojan.
|My System Specs|
|Similar help and support threads for2: Analysis: Flashback Spread Via Social Engineering, Then Java Exploits|
|NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...||Security News|
|Technology and social media. Helping social interactions or not?||Chillout Room|
|Worm Tries AutoRun, Then Social Engineering to Infect||Security News|
|Mac Flashback Flaw Reused by New Malware Campaign||Security News|
|Java Exploits||Security News|
|IE8 Best at Stopping Social-Engineering Malware, Test Reports||Browsers & Mail|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 10:04 PM.