Apple quietly announced today it is working on a tool to detect and remove the Flashback malware currently infecting hundreds of thousands of Mac computers around the world.
"In addition to the Java vulnerability, the Flashback malware relies on computer servers hosted by the malware authors to perform many of its critical functions," Apple wrote on its Web site. "Apple is working with ISPs worldwide to disable this command and control network."
Apple did not indicate when it expected the tool to be released to the public, and a company spokesman could not provide an estimate.
The malware made headlines last week when a Russian antivirus company revealed thatwith the malware, which is designed to steal personal information. The masquerading as a fake Adobe Flash Player plug-in installer, but in the past few months it has evolved to exploit Java vulnerabilities that went unpatched in Mac systems.
Several experts have since said that the infectionto target Apple's Mac platform, which has grown in recent years alongside the popularity of the company's mobile devices.
Anti-malware makers have made efforts to build detection and removal tools for Flashback into their products, though one of the most readily available methods has been a manual process that involves plugging code strings into a built-in system utility. For its part, Applefor OS X 10.6 and 10.7 that brings Java up-to-date and patches these vulnerabilities to keep computers from being infected in the first place.
[Via The Loop]
CNET staff writer Josh Lowensohn contributed to this report.
Apple - USE TAG
reading•Apple working on Flashback removal tool
Sep 20•Amazon Echo Plus stays $150 but gets clearer sound, temperature sensor
Sep 20•Amazon Echo Wall Clock is an old-school clock, with an Alexa twist
Sep 20•Amazon Echo Sub is $130, turns Echos into a 2.1 system
Sep 20•Amazon Echo launch live blog: Get all your Alexa updates here