

Clicking on the links does however open new pop-up pages, which are all pulled from a separate remote server," F-Secure said, nothing that this attack may be aimed at serving ads to infected Mac OS X machines.Īpple has struggled recently with scareware attacks on its platform and the latest sighting is further proof that the increase in Mac OS X market share has attracted the attention of malware writers.

" Even though the page looks fairly realistic, clicking on any of the links does not take the user to any other sites.

The server at the IP address displays a fake webpage designed to appear similar to the legitimate Google site. Once installed, the trojan adds entries to the hosts file to hijack users visiting various Google sites (e.g.,, , et cetera) to the IP address 91.224.160.26, which is located in Netherlands. The Trojan is currently being delivered via fake a Adobe Flash Player (FlashPlayer.pkg) update, F-Secure said in a blog post. I know that's fucking stupid, I don't know what went through my head. I'm on OSX so I downloaded the 'codec fix' from the link in the readme. Researchers at F-Secure have intercepted a new malicious threat for Apple's Mac OS X - a Trojan that redirects users to fake Google web sites. Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers. Ukrainian developers share stories from the war zone The best Wi-Fi router for your home office 3G shutdown is underway: Check your devices now Fake Flash Player download pages pushing malware As you may already heard, Adobe has pushed out an update for Flash Player that fixes vulnerabilities discovered to be currently exploited in the.
