A new variant of Flashback, the malware found earlier this month to be infecting hundreds of thousands of Macs, has spawned a new variant, security researchers announced today.
The new variant -- dubbed Flashback.S -- "is actively being distributed in the wild," taking advantage of a Java vulnerability that Apple has already patched, security company Intego said in a statement. The new variant installs itself on the user's home folder without a password and then deletes all folders and files from the Java cache folder to mask its presence.
At its height, the original Flashback, which was designed to grab passwords and other information from users through their Web browser and other applications, was estimated to be. However, the researchers did not indicate what this new variant was specifically designed to do or how many computers might be infected.
The original malware typically installed itself after a user mistakes it for a legitimate browser plug-in while visiting a malicious Web site. The malware would then collect personal information and send it back to remote servers.
While more than half a million Mac worldwide were thought to be infected by the original malware at the beginning of April, software maker and security firm Symantec last weekto 140,000.
The lowered estimates were due in part to Apple's release of software patches and software tools that both detect and remove the malware. Additionally, ahead of those official tools, Symantec and security firms F-Secure and Kaspersky released their own detection and removal software.
reading•New Flashback variant making the rounds
Apr 19•Watch Apple's Daisy robot rip apart old iPhones
Apr 19•Meet Daisy, Apple's new iPhone recycling robot
Apr 19•This new 2018 iPhone may cost half the price of an iPhone X
Apr 19•Apple unveils 'Daisy' iPhone recycling robot for Earth Day