Apple quietly announced today it is working on a tool to detect and remove the Flashback malware currently infecting hundreds of thousands of Mac computers around the world.
"In addition to the Java vulnerability, the Flashback malware relies on computer servers hosted by the malware authors to perform many of its critical functions," Apple wrote on its Web site. "Apple is working with ISPs worldwide to disable this command and control network."
Apple did not indicate when it expected the tool to be released to the public, and a company spokesman could not provide an estimate.
The malware made headlines last week when a Russian antivirus company revealed thatwith the malware, which is designed to steal personal information. The masquerading as a fake Adobe Flash Player plug-in installer, but in the past few months it has evolved to exploit Java vulnerabilities that went unpatched in Mac systems.
Several experts have since said that the infectionto target Apple's Mac platform, which has grown in recent years alongside the popularity of the company's mobile devices.
Anti-malware makers have made efforts to build detection and removal tools for Flashback into their products, though one of the most readily available methods has been a manual process that involves plugging code strings into a built-in system utility. For its part, Applefor OS X 10.6 and 10.7 that brings Java up-to-date and patches these vulnerabilities to keep computers from being infected in the first place.
[Via The Loop]
CNET staff writer Josh Lowensohn contributed to this report.
Apple - USE TAG
reading•Apple working on Flashback removal tool
Oct 16•A faster Surface Laptop 2 is back, now in black
Oct 16•Racing ahead of last year's model
Oct 16•iPhone XR: Why you should probably wait one more week for this iPhone
Oct 16•iPhone XS specs vs. XS Max, XR, X: What's new and different