Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Some 140,000 Macs remain infected with the Flashback trojan.
Statistics from Symantec's sinkhole are showing declining numbers on a daily basis, but not an overall clean-up.
It was initially rumoured that around 600,000 Macs were infected with Flashback on 9 April; this dropped to 380,000 on 10 April and then to 225,000 on 13 April when Apple issued a software update to fix the issue.
The Symantec analysis also revealed that the malware was receiving updated information via Twitter about which command-and-control servers to contact for additional instructions. This is accomplished "by searching for specific hashtags generated by the [Flashback] hashtag algorithm", according to the vendor.
Research from Kaspersky Lab found that its authors relied on infecting WordPress sites so that when unsuspecting users visited, they were silently redirected to a site that installed Flashback via a drive-by download.
Alexander Gostev, head of Kaspersky Lab's global research and analysis team, said that from February to March, thousands of sites created on the popular publishing platform were poisoned when their webmasters were running vulnerable versions of WordPress.
“Approximately 85 per cent of the compromised WordPress sites are located in the United States.”
Kaspersky Lab said that WordPress is a very popular platform for attackers to target as there is not a whole lot it can do if people neglect to update their WordPress or plug-in software.
In late January, Websense began tracking the outbreak on WordPress, with the number of WordPress blogs that had been compromised said to be gradually growing; a vulnerable version of WordPress, 3.2.1, was updated in December but was still widely in use.
Websense said that attackers were using automated scanners to find vulnerable sites, then taking advantage of input validation errors to embed IFRAMEs, which redirected users to exploited sites.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.