Categories: Uncategorized

Flashback Targeted Google (But Their Takings Were Pretty Modest)

The hackers who disseminated the Flashback trojan, which shook the confidence of Apple users who had grown accustomed to not dealing with malware, were making a quick buck at Google‘s expense, according to research by Symantec. When a user visits a compromised site, Flashback covertly installs software that redirects certain Google queries to pages chosen by Flashback’s authors – who get 0.8 cents for each “click.” “This ultimately results in lost revenue for Google and untold sums of money for the Flashback gang,” Symantec wrote. Well, sort of. In the grand scheme of things, the ill-gotten gains were actually pretty modest, with researchers estimating that at the infection’s peak, they might have been earning as much as $10,000 a day. In contrast, Google netted an average of more than $113 million per day from advertising revenue during the first quarter of 2012. As for the vulnerability, Symantec says that OS X developers were lulled into a false sense of security by Apple’s reputation for being impervious to malware. The hackers just took advantage of a window between patches to strike, infecting hundreds of thousands of unexpecting computers. “The Flashback authors took advantage of the gap between Oracle and Apple’s patches by exploiting vulnerable websites using WordPress and Joomla to add malicious code snippets,” they wrote. It’s not that hard to detect and get rid of Flashback, and security experts caution Apple users to be more wary about downloading and installing software from unknown sources. And Apple has been responsive, updating OS X’s built in security tool twice since Flashback was released to deal with new variants of the trojan. More significant, perhaps, than Google’s lost revenue is the image hit Apple has taken from the outbreak, which runs counter to the conventional wisdom that Apple’s operating systems are watertight, or that its market share is too small for hackers to bother exploiting its users. Flashback, though, has shown that the company has grown large enough to appear on the radar for malware progenitors, and that weaknesses exist in its system. The company has remained mostly quiet about Flashback, issuing a few terse statements about security precautions that acknowledge the danger but do not elaborate. “A recent version of malicious software called Flashback exploits a security flaw in Java in order to install itself on Macs,” read one recent announcement.

Techli

Edward is the founder and CEO of Techli.com. He is a writer, U.S. Army veteran, serial entrepreneur and chronic early adopter. Having worked for startups in Silicon Valley and Chicago, he founded, grew and successfully exited his own previous startup and loves telling the stories of innovators. Email: Edward.Domain@techli.com | @EdwardDomain

Recent Posts

NovaWave Capital brings new LPs on board and launches AI venture studio

NovaWave Capital, the Silicon Valley-based VC fund, announced this week that it's expanding its AI…

7 días ago

Automotus picks up $9M to bring AI order to congested curbs

Automotus, a Los Angeles startup focused on using software to untangle curbside congestion, has raised…

2 semanas ago

7 Tech Innovations to Watch in 2026

As we move deeper into the digital age, 2026 is shaping up to be a…

2 semanas ago

AI is professionalizing how enterprises communicate

For startups, mastering communication is no longer just about persuasion—it’s about scalability. As companies grow,…

4 semanas ago

India’s rise in a fragmented world sets the stage for the Horasis India Meeting in Singapore

In an increasingly fragmented world economy, global alignment has become both an opportunity and a…

1 mes ago

On route to Las Vegas: AI-supported resilience coach from Deep Care named Digital Health honoree at CES Innovation Awards 2026

The world-renowned CES Innovation Awards® program is an annual competition honoring outstanding design and engineering…

1 mes ago