Great news for Adobe Flash Player users because the app can now be used by older Mac or PC. However, there is a threat for the security of your computer due to malware.
This happens when you are prompted to update Adobe Flash Player for your Mac or PC. Take note that the Internet has a plethora of fake popups such as Adobe Flash Player Update, Your Computer Has Been Blocked, and Call Technical Support. When you come across some issues like these, then you might be a victim of fake information dissemination over the Web.
Cyber criminals target unsuspecting victims by tricking them into paying or calling services that are not necessary. Take note that all adware-type apps are similar in nature. They often offer useful features, such as deceiving users to believe that they are useful and legit.
If you are not aware of this, then you might have installed adware on your computer already. This is because adware is being distributed with the use of deceptive marketing. Oftentimes, users would rush the download or installation process of any app, which could be concealing bundled programs at the Custom/Advanced section. If you would skip this section, a bigger chance of being exposed to risk of virus and compromise your privacy.
Adobe Flash Virus Mac Removal
If you're concerned about the security flaws associated with Adobe's Flash Player we show you how to find out if it's installed on your Mac, and how to uninstall it if it is. Adobe Flash has. Following Adobe's release of a 'critical' update for Flash Player yesterday to address a security issue that is currently being exploited in the wild, Apple has updated its 'Xprotect' anti-malware.
You can easily avoid the installation of potentially unwanted programs by analyzing the Custom/Advanced settings first. Then, you have to decline offers for downloading and installing of third-party software. This is because caution is the key to computer security.
It is also possible to remove newly installed programs that might have been installed on your PC or Mac with malicious intent. For PC users, simply go to Control Panel -> Programs and Features and uninstall any app you think is causing the issues. For Mac users, just go to Finder -> Applications, and drag the app from the Applications folder into the Trash bin icon. To confirm the removal, right click on the Trash icon and choose Empty Trash.
By Chris Smith and Daniel Eran Dilger
Wednesday, October 19, 2011, 03:03 pm PT (06:03 pm ET)
Wednesday, October 19, 2011, 03:03 pm PT (06:03 pm ET)
Flash Player Virus On Mac
A new version of an existing Trojan Horse posing as a legitimate Flash Player installer (named “Flashback.A” by a security firm) is designed to disable updates to the default Mac OS X anti-malware protection system, potentially leaving the system open to the manual installation of other malware without any system warnings.According to security researchers at F-Secure, “Flashback.C” is potentially capable of disabling the auto-update component of Apple’s built-in XProtect anti-malware application by overwriting the system binary that checks for updates, XProtectUpdater. That functionality is apparently not yet active, however.
Once the malware is installed and delivered an external payload from malicious servers, the local system would be unable to obtain the latest anti-malware definitions and could subsequently be infected by other malicious programs the user installs without seeing the warnings that Mac OS X's XProtect feature is designed to present to users when they attempt to install malicious software that matches known threats, a definition list Apple maintains and which XProtectUpdater references daily.
Disabling system defenses is a common tactic employed by malware programs, the security firm notes, with built-in malware detection programs being “the first target on any computing platform.”
Discovered in late September, the “Flashback.A” Trojan poses as an Adobe Flash installer in an attempt to trick Mac OS X users into installing the program in order to access Flash-based content on the web. The trojan primarily targets Mac OS X Lion users, since Apple’s latest desktop operating system doesn’t come with Flash preinstalled.
“Flashback.C” similarly masquerades as a Flash installer, displaying the same visual elements during the installation process (shown below) in an attempt to convince users they are installing a genuine copy of Flash. Once installed, “Flashback.C” first checks to see if the user is running 'Little Snitch,' a firewall program that could alert the user of its actions. If it is found to be installed, the trojan deletes itself.
If it doesn't find Little Snitch, the malware then tries to connect to a remote host in China in order to obtain other installation files and configurations. F-Secure notes that 'the remote host is up but it does not [yet] push anything.' If and when the site becomes active, it could deliver a payload that the trojan could use to disable the system's auto-updater, using Safari or Firefox to deliver the malicious code via an LSEnvironment variable that loads when the browser restarts.
In order to prevent a potential infection with “Flashback” Trojans, Mac users are advised to obtain their copy of Adobe Flash Player directly from Adobe’s official website and to disable the 'Open 'safe' files after downloading' option in Apple's Safari browser to avoid automatically running files downloaded from the Internet.
Users should also refuse to enter their local account password at any prompt to do so unless they understand why it is required.
In case an infection has occurred, F-Secure provides instructions for removing the Trojan: Scan the whole system and take note of the detected files, then remove the plist entry:
From:
/Applications/Safari.app/Contents/Info.plist
/Applications/Firefox.app/Contents/Info.plist
Delete all detected files
At this time there is not yet a fix from Apple that would automatically flag the new Trojan version as malware when it is being installing on Mac systems, but the trojan is not actually working yet either, so users shouldn't be afraid they are already infected unless they are in the process of installing Adobe Flash from a non-legitimate source.
The evolutionary attempts to create new Mac OS X malware highlight the problems with allowing users to install software from any source, something that has plagued Windows and Mac users with the threat of user-installed malware, and something that has recently exploded as a growing concern among Android users. iOS users are protected from such malware attempts by the security of the App Store, and Apple's Mac App Store affords similar security to its desktop users.
However, web browser plugins such as Adobe Flash, along with other software that plugs into the system on a low level, are not possible to deliver through the App Store under Apple's current policies. Somewhat ironically, users can install the Flash Block app from the Mac App Store, which for 99 cents, offers to temporarily kill active Flash content to conserve battery life, or to block Flash entirely.