how to check your mac/remove the Flashback Troja
How you get it:
Basically it is a Java drive by, and usually it pretends to be a new version of flashplayer
What it does:
-Sends screenshots of your personal information to a remote server
-Avoids detection by hiding from your AV
-Then it will eventually download the Malware its self
How many are infected?
Its estimated that 600,000+ machines have been infected
Now to see if you have it is simple
Go to Terminal and enter these in one at a time:
Code:
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
defaults read /Applications/Safari.app/Contents/Info LSEnvironment //Thats for Safari
defaults read /Applications/Firefox.app/Contents/Info LSEnvironment //Thats for firefox
defaults read /Applications/Chrome.app/Contents/Info LSEnvironment
//Thats for Chrome
Now if it comes up: "The domain/default pair of (/Applications/Chrome.app/Contents/Info, LSEnvironment) does not exist"
Then you are clear
but if something comes up then you have the Trojan
To remove it, its simple
When these commands are run, make a note of the full file path that is output to the terminal window (it may be paired with the term "DYLD_INSERT_LIBRARIES"). For each of the commands that output a file path (and do not say the domain pair does not exist), copy the full file path section and the run the following command with the file path in place of FILEPATH in the command (copy and paste this command):
Code:
grep -a -o '__ldpath__[ -~]*' FILEPATH
Now you must ocate the files mentioned in the output of the above commands, and delete them. If you cannot locate them in the Finder, then for each first type "sudo rm" in the terminal followed by a single space, and then use your mouse cursor to select the full file path from the first command's output, and use Command-C followed by Command-V to copy and paste it back into the Terminal. Then press Enter to execute the command and remove this file.
Now you have more commands to run but then you will be safe!
Code:
sudo defaults delete /Applications/Safari.app/Contents/Info LSEnvironment
sudo chmod 644 /Applications/Safari.app/Contents/Info.plist
sudo defaults delete /Applications/Firefox.app/Contents/Info LSEnvironment
sudo chmod 644 /Applications/Firefox.app/Contents/Info.plist
defaults delete ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
launchctl unsetenv DYLD_INSERT_LIBRARIES
There you go your directories are back to default and you no longer have a trojan!
No comments:
Post a Comment