Categories: Uncategorized

Flashback Targeted Google (But Their Takings Were Pretty Modest)

The hackers who disseminated the Flashback trojan, which shook the confidence of Apple users who had grown accustomed to not dealing with malware, were making a quick buck at Google‘s expense, according to research by Symantec. When a user visits a compromised site, Flashback covertly installs software that redirects certain Google queries to pages chosen by Flashback’s authors – who get 0.8 cents for each “click.” “This ultimately results in lost revenue for Google and untold sums of money for the Flashback gang,” Symantec wrote. Well, sort of. In the grand scheme of things, the ill-gotten gains were actually pretty modest, with researchers estimating that at the infection’s peak, they might have been earning as much as $10,000 a day. In contrast, Google netted an average of more than $113 million per day from advertising revenue during the first quarter of 2012. As for the vulnerability, Symantec says that OS X developers were lulled into a false sense of security by Apple’s reputation for being impervious to malware. The hackers just took advantage of a window between patches to strike, infecting hundreds of thousands of unexpecting computers. “The Flashback authors took advantage of the gap between Oracle and Apple’s patches by exploiting vulnerable websites using WordPress and Joomla to add malicious code snippets,” they wrote. It’s not that hard to detect and get rid of Flashback, and security experts caution Apple users to be more wary about downloading and installing software from unknown sources. And Apple has been responsive, updating OS X’s built in security tool twice since Flashback was released to deal with new variants of the trojan. More significant, perhaps, than Google’s lost revenue is the image hit Apple has taken from the outbreak, which runs counter to the conventional wisdom that Apple’s operating systems are watertight, or that its market share is too small for hackers to bother exploiting its users. Flashback, though, has shown that the company has grown large enough to appear on the radar for malware progenitors, and that weaknesses exist in its system. The company has remained mostly quiet about Flashback, issuing a few terse statements about security precautions that acknowledge the danger but do not elaborate. “A recent version of malicious software called Flashback exploits a security flaw in Java in order to install itself on Macs,” read one recent announcement.

Techli

Edward is the founder and CEO of Techli.com. He is a writer, U.S. Army veteran, serial entrepreneur and chronic early adopter. Having worked for startups in Silicon Valley and Chicago, he founded, grew and successfully exited his own previous startup and loves telling the stories of innovators. Email: Edward.Domain@techli.com | @EdwardDomain

Recent Posts

Crescite Bets on Faith-Driven Finance With Catholic USD™, a New Kind of Stablecoin

Crescite Innovation Corporation is entering the stablecoin space with an approach that challenges the dominant…

1 día ago

AI maintenance startup Fracttal raises $35 million to scale predictive asset management

Fracttal, a leading company in AI-powered maintenance solutions, announced on Wednesday it has closed a…

1 semana ago

NovaWave Capital brings new LPs on board and launches AI venture studio

NovaWave Capital, the Silicon Valley-based VC fund, announced this week that it's expanding its AI…

3 semanas ago

Automotus picks up $9M to bring AI order to congested curbs

Automotus, a Los Angeles startup focused on using software to untangle curbside congestion, has raised…

4 semanas ago

7 Tech Innovations to Watch in 2026

As we move deeper into the digital age, 2026 is shaping up to be a…

4 semanas ago

AI is professionalizing how enterprises communicate

For startups, mastering communication is no longer just about persuasion—it’s about scalability. As companies grow,…

1 mes ago