Apple ships stand-alone Flashback Malware Removal Tool
Working the problem. Apple has released a stand-alone malware removal tool specific to Macs running OS X Lion that don’t have Java installed — so, are there versions of Flashback that can infect a Mac without Java installed? That’s an interesting question.
Recent Flashback posts:
— Apple’s Java patch removes Flashback, but not all variants
— Apple lays Mac App Store double authentication groundwork
— Top 10 free ways to secure your Mac
— Mother of all Mac botnets? BackDoor.Flashback.39 spreads
— OpenDNS blocks Flashback Trojan
Should the Flashback Malware Removal Tool detect Flashback an infection, a dialog will be presented notifying the user that malware was removed. Further, Apple advises that in some cases, the Flashback malware removal tool could restart the user’s Mac in order to completely remove an infection.
More information please
Again, Apple states that “This update is recommended for all OS X Lion users without Java installed.” Does this mean users that have removed Java in the wake of Flashback or does it mean that the malware can infect Macs that never had Java installed?
It also bears pointing out again that the Flashback MRT removes the “most common versions” of the malware. With more than 600,000 Macs said to have been infected, a 99 percent success rate would leave thousands still infected.
I’m very much looking forward to clarification from Apple on these points…
What’s your take?