OpenDNS does not prevent this at all and OpenDNS has all sorts of other issues.
It's not a perfect cure but it helps more than it would hurt.
This has nothing to do with Flash.
Another reason to use OpenDNS as your DNS. Even if you get fooled by something this obvious there's at least a net to catch you before you fall.
Been out of the loop for 10 weeks and MacRumors is getting my up to speed fast. I love this site.
...and nothing to do with Trojans, right?
What net?
OpenDNS does not follow RFCs for name resolution. They hijack and redirected failed name look-ups.
Is this a sign?
Or just coincidence that in less then half a year two trojans show up in mac land.
A short question:
I am kinda new too Mac OSX so I wonder if i need to download that anti malware program Apple gives. Or does that come standard on OS X Lion? I can't find it in my programs.
Thanks!
Trojans have been around for much longer than that on OS X, this is a sign of status quo is anything. It just gets reported more than it used to.
Any platform (outside one which is completely controlled like iOS) is susceptible to trojans, which depends on a user to fall for a trick and take necessary actions.
...and nothing to do with Trojans, right?
Funny.... I updated Flash yesterday on my kids' Mac mini and I thought that writing a Trojan that masquerades as an update to Flash would be brilliant since Flash is updated so often and getting prompted that you need to update Flash to view a website is very common..... And then today, here it is.
Jailbreakme.com uses an actual exploit in the operating system. I was speaking generally about a basic trojanone which tricks the user into installing it only to become something unexpected. Through the App Store the only way this can happen is if Apple actually allows it to slip through inspection. To hype that slim possibility as statistically significant would be hyperbolic. Actually, it is a little hyperbolic to use jailbreakme.com as an example of there being a real trojan threat on iOS, whether combining an exploit or otherwise.Ever heard of the site jealbreakme.com? There's no single man made OS (with extensive GUI elements and under the hood frameworks etc.) currently Trojan free.
If you jailbreak it, some. If you don't jailbreak it, what? Spyware, perhaps, in the form of applications extracting information which isn't clearly announced to the user, but not on par with what many people expect when they hear the word 'Spyware' these days.Even iOS has had trojan/spyware
A question I have though, is under what conditions should ANY software modify the hosts file? Should Apple even allow programs that have been granted administrative rights to alter the hosts file? There is only a very limited benvolent use case for such an action, and that very related to what they did here: some anti-ad or anti-spyware utilities modify a host file to redirect known ad-producing domains to a "safe" domain. I personally think any modification of the host file should be given a warning like this:
It is a trojan but is really does have nothing to do with Flash. This could be posing as an update to Safari, Mail.app, iPhone or anything else basically.
I take it you guys are from out of town, and not familiar with USC?It's a Trojan that appears to be a Flash update.
menu go to folder ..type this: /etc/
then open - hosts
the inside should look like this if it has not been modified
##
# Host Database
#
# localhost is used to configure the loopback interface
# when the system is booting. Do not change this entry.
##
127.0.0.1 localhost
255.255.255.255 broadcasthost
::1 localhost
fe80::1%lo0 localhost
Yep. Every time I've tried to use it I've come across some kind of crazy problem or another, usually involving accessing certain types of content on the internet. I don't have much love for OpenDNS.OpenDNS does not prevent this at all and OpenDNS has all sorts of other issues.
The hosts file is not the only file in OS X that can be altered to yield malicious results. Apple would have to undertake an enormous amount of effort to protect every file that a given instance of malware can tamper with.
The problem, to me, seems to be traditional installers that do all kinds of things behind the user's back. I don't understand why Apple even supports installers anymore. Apple created a brilliant method of software installation with app bundles. Just drag and drop the app to your Applications folders and it's done. I'd always assumed that's where OS X was headed eventually and that installers were on their way out.
Hmm, what are you thinking about today?
Today I am thinking it would be great if brilliant if Apple gave away free MacBook Airs with the purchase of an iPhone charging adapter. Let's see if I really focus on that if it comes true tomorrow.
Question is does Xprotect have the capability to undo damage done by this malware? Can it repair the hosts file?
Search results on the fake Google pages actually lead to pop-up windows that load external content which was broken at the time of discovery