So it switches the updating from automatic to manual use?
OR does it prevent manual updates as well?
Because the Trojan appends launch instructions to property lists within the Safari and Firefox programs, if you would like to check to see if a system has been infected with this Trojan, you can open the Terminal and run the following commands:
If you have Safari:
defaults read /Applications/Safari.app/Contents/Info.plist LSEnvironment
If you have Firefox:
defaults read /Applications/Firefox.app/Contents/Info.plist LSEnvironment
On an uninfected system these commands should produce an error message stating the specified domain/default pair does not exist. However, if these commands give an output that includes the text "DYLD_INSERT_LIBRARIES" followed by a path to a file, then the Trojan installer has been run and has infected the system. If this is the case, you can remove the infection either by editing Safari or Firefox to prevent the payload from running, or by simply deleting the browsers and downloading them again. Doing the latter should completely remove the payload from your system.
Peace out Homies...Keep it Safe.![]()
Because the Trojan appends launch instructions to property lists within the Safari and Firefox programs, if you would like to check to see if a system has been infected with this Trojan, you can open the Terminal and run the following commands:
If you have Safari:
defaults read /Applications/Safari.app/Contents/Info.plist LSEnvironment
If you have Firefox:
defaults read /Applications/Firefox.app/Contents/Info.plist LSEnvironment
On an uninfected system these commands should produce an error message stating the specified domain/default pair does not exist. However, if these commands give an output that includes the text "DYLD_INSERT_LIBRARIES" followed by a path to a file, then the Trojan installer has been run and has infected the system. If this is the case, you can remove the infection either by editing Safari or Firefox to prevent the payload from running, or by simply deleting the browsers and downloading them again. Doing the latter should completely remove the payload from your system.
Peace out Homies...Keep it Safe.![]()
Thanks dude- I'm safe.
Weird thing though- I was just prompted to update the Adobe Flash Player after opening MACRUMORS..... it could have been a legit update from Adobe, but I wasn't taking any chances.
Oh, god, here we go again with the virus vs malware vs trojan vs etc., etc.
Malware is a generic category (malicious software). Viruses, trojans, spyware and all other crap that f***ks with your computer are malware.
Macs have never been infected by a virus up to this date. Yes, it is possible sometime in the future a virus could be developed that will infect a Mac. Nothing to this date!
Trojan is NOT a virus - it is a form of malware. Unlike a virus which can infect a computer without action on the part of the user, trojans have to be invited in. In short - the user has to screw up.
The best defense is an educated user.
(GGJstudios - How did I do??![]()
)
Because the Trojan appends launch instructions to property lists within the Safari and Firefox programs, if you would like to check to see if a system has been infected with this Trojan, you can open the Terminal and run the following commands:
If you have Safari:
defaults read /Applications/Safari.app/Contents/Info.plist LSEnvironment
If you have Firefox:
defaults read /Applications/Firefox.app/Contents/Info.plist LSEnvironment
On an uninfected system these commands should produce an error message stating the specified domain/default pair does not exist. However, if these commands give an output that includes the text "DYLD_INSERT_LIBRARIES" followed by a path to a file, then the Trojan installer has been run and has infected the system. If this is the case, you can remove the infection either by editing Safari or Firefox to prevent the payload from running, or by simply deleting the browsers and downloading them again. Doing the latter should completely remove the payload from your system.
Peace out Homies...Keep it Safe.![]()
It's disturbing that, after decades of malware, that people will still consider installing software from untrusted sources. Especially when the software is a free download.
More accurately, Mac OS X has never been infected by a virus up to this date. There have been viruses for the classic Mac platform, although most are very old and not likely to be in the wild, and wouldn't work on a modern Mac even if you downloaded it.
Where did you download it from? The official source is from Adobe: http://get.adobe.com/flashplayer/. You shouldn't consider installing a copy downloaded from anywhere else.
- Flash must be updated for system security.
- Safari thinks installer packages are "safe files" and will open them automatically (unless unchecked in preferences) allowing trojans to launch installation upon download. Ridiculous.
This is true but this is less applicable to OS X than other OSs.
Despite the installer launching automatically, the user still has to click through the installer to install the malware.
So, the security implications of the installer launching automatically aren't very significant.
I don't believe I mentioned any other OSs. If it is true, it is true.
The security implications are huge...The subterfuge couldn't take place without the installer opening and prompting the user to install Flash.
If you think that mitigating a social engineering factor wouldn't affect computer security when faced with a trojan, you're insane.
If you disable Safari's "feature" to automatically open "safe" downloads, then neither will auto-launch. If you configure your web browser to always prompt for download locations, then it won't be able to auto-download either, since you'll be asked to select a destination (and you can click "cancel").i think this is a little more confusing for most users than people are granting.
- both the real Flash update and the trojan will prompt users to install while randomly browsing the web.
- both the real Flash update and the trojan prompt for admin password since they both need access to system files.
This is an unreliable way to tell. The next version of the malware may look like the Adobe installer, and Adobe may change their installer in the future.... as far as I can tell, the main difference is in the install window you see.
legitimate Flash updates should look like this...
From your description, it appears that Apple's malware-detector identified the malware before the installer ran.Well I had the above notification and I moved it to the trash. What I'm wondering is why it did not infect anything? My computer is running fine, and how come it let me move it to the trash so simply? Did it never truly install?
Because the Trojan appends launch instructions to property lists within the Safari and Firefox programs, if you would like to check to see if a system has been infected with this Trojan, you can open the Terminal and run the following commands:
If you have Safari:
defaults read /Applications/Safari.app/Contents/Info.plist LSEnvironment
If you have Firefox:
defaults read /Applications/Firefox.app/Contents/Info.plist LSEnvironment
On an uninfected system these commands should produce an error message stating the specified domain/default pair does not exist. However, if these commands give an output that includes the text "DYLD_INSERT_LIBRARIES" followed by a path to a file, then the Trojan installer has been run and has infected the system. If this is the case, you can remove the infection either by editing Safari or Firefox to prevent the payload from running, or by simply deleting the browsers and downloading them again. Doing the latter should completely remove the payload from your system.
Peace out Homies...Keep it Safe.![]()
Can someone, anyone tell me why anyone would spend all that time and money to develop a trojan horse? What do they get out of it? Who pays for it? Am I just a naive user?? What is the end-game here? I don't get it.![]()
macs are starting to become more popular so viruses will be appearing everywhere.
Ran the terminal lines with "does not exist" error messages as result.
On the other hand I'm unable to find the com.apple.xprotectupdater.plist file in library folder.....
In which folder in library am I suppose to find it?
Should I be concerned?????![]()
Not true.If you disable Safari's "feature" to automatically open "safe" downloads, then neither will auto-launch. If you configure your web browser to always prompt for download locations, then it won't be able to auto-download either, since you'll be asked to select a destination (and you can click "cancel").