Flashback malware removal tool for 10.7 Lion systems

Asked By 50 points N/A Posted on -
qa-featured

After running the flashback removal tool, how will I know that the flashback malware is fully deleted in my computer?

SHARE
Best Answer by Sharath Reddy
Answered By 0 points N/A #137777

Flashback malware removal tool for 10.7 Lion systems

qa-featured

Be informed that from April 12th there are new downloads available at the same links Apple suggested before. Only those links contain the built-in removal tool of the Malware.

So, make sure you have got the latest. Those links remove the most common kinds of Flashback. If you flashback removal tool is running, then a dialog will notify you that the malware had been removed.

But it is advisable to restart your computer in order to be sure that the flashback malware was removed completely. After the mentioned above your flashback malware will be fully deleted from the computer.

Best Answer
Best Answer
Answered By 590495 points N/A #137778

Flashback malware removal tool for 10.7 Lion systems

qa-featured

In the first quarter of 2012, a new variant of the Imuler/Revir Trojan malware has found its way to infect Mac OS X computers. Before, most of the viruses and Malware only infect computers running on Microsoft Windows but now Mac users are also deemed to be infected. This is another variant of the Flashback Trojan malware called “OSX/Flashback.I” that infects Mac OS X platforms and are being circulated disguised as erotic images which when installed will steal personal information and then upload them immediately to remote servers.

If in case you are a Mac user and your machine got infected with this Trojan malware, you can download the latest Flashback Removal Security Update from Apple Support about the security content of Flashback Removal Security Update. If you want to know if your system is indeed infected with this malware, you can run these three commands in succession in the OS X Terminal utility located in the “/Applications/Utilities/” folder:

  • defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
  • defaults read /Applications/Safari.app/Contents/Info LSEnvironment
  • defaults read /Applications/Firefox.app/Contents/Info LSEnvironment

If your system is not infected, the output of these commands will say that the “domain/default” pair “does not exist”. But if your system is infected, the output of the Terminal will point to the path of the malware.

Related Questions