	{"id":31132,"date":"2014-08-26T09:57:22","date_gmt":"2014-08-26T16:57:22","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=31132"},"modified":"2016-02-12T10:46:02","modified_gmt":"2016-02-12T18:46:02","slug":"flashback-malware-still-threat","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/","title":{"rendered":"Flashback to the Biggest Mac Malware Attack of All Time\u2014Is it Still a Threat?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/flashback-malware-still-threat-2\/\" rel=\"attachment wp-att-31183\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31183\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-malware-still-threat.jpg\" alt=\"Flashback to the Biggest Mac Malware Attack of All Time -Is it Still a Threat?\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-malware-still-threat.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-malware-still-threat-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-malware-still-threat-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a>In early 2012, the biggest Mac malware attack of all time was taking place &#8211; catching out at least 600,000 unguarded Mac users around the world, including (to potentially one famous company&#8217;s embarrassment) some <a title=\"Link to media report\" href=\"http:\/\/macdailynews.com\/2012\/04\/05\/600000-macs-infected-with-flashback-trojan-274-in-cupertino-how-to-check-your-mac\/\" target=\"_blank\" rel=\"nofollow\">274 in Cupertino<\/a>.<\/p>\n<p>The Flashback malware posed as a bogus installer for Adobe Flash, exploiting a Java vulnerability to infect iMacs and MacBooks.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31138\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback.jpeg\" alt=\"Flashback\" width=\"600\" height=\"446\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-150x111.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-300x223.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The truth is that Flashback should never have been able to spread at all. The drive-by download vulnerability in Java that Flashback relied upon had been patched by Oracle two months before&#8230; at least for Windows users.<\/p>\n<p>Apple, unfortunately, had left Mac users vulnerable for more than six weeks &#8211; and only when the story of the major malware outbreak affecting Macs hit the headlines did they stir into action, and release a patched version of Java for Mac OS X users.<\/p>\n<p>Subsequently, Apple realised the error of its ways and took the &#8220;nuclear&#8221; option of removing Java from the default installation of Mac OS X altogether, leaving it up to users to decide if they really wanted to install the software, which has been plagued with security holes in recent years.<\/p>\n<div id=\"attachment_31135\" style=\"width: 570px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\"><img aria-describedby=\"caption-attachment-31135\" loading=\"lazy\" class=\"wp-image-31135 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-infographic.jpeg\" alt=\"Flashback infographic\" width=\"560\" height=\"745\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-infographic.jpeg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-infographic-112x150.jpeg 112w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-infographic-225x300.jpeg 225w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><p id=\"caption-attachment-31135\" class=\"wp-caption-text\">How Flashback infects Macs<\/p><\/div>\n<p>Chances are that most of us thought that would be the end of the story for Flashback &#8211; with the only possible coda being the <a title=\"Flashback Author Identified by Brian Krebs\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-author-identified-by-brian-krebs\/\" target=\"_blank\">possible identification<\/a> of whoever might have masterminded the hard-hitting malware outbreak attack.<\/p>\n<p>With the lack of any arrests or prosecution, however, I thought it meant we probably wouldn&#8217;t be talking about Flashback again &#8211; and it would go down in the annals of cybercrime history as one of the reasons why Mac users finally worked up to the reality of malware threatening their computers.<\/p>\n<p>Yes, Java vulnerabilities remain an issue &#8211; but Oracle is now responsible for patching those security holes for Mac users, and if you haven&#8217;t consciously chosen to install Java onto your computer, you shouldn&#8217;t have to lose any sleep about it.<\/p>\n<p>But there remains evidence that Flashback remains a threat, even if it&#8217;s nothing like as big a problem as it was 18 months ago.<\/p>\n<p>At the start of this year, Intego&#8217;s malware research team revealed that the Flashback botnet was still active, with some <a title=\"Why the Flashback Botnet is a Threat\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-the-flashback-botnet-is-a-threat\/\" target=\"_blank\">22,000 infected computers still in its grasp<\/a>. This meant that there were still opportunities for online criminals to exploit compromised Mac computers in order to send spam, steal information, or generate additional income by installing adware or redirecting web browsers.<\/p>\n<p>And last week <a title=\"Link to CSO Online\" href=\"http:\/\/www.csoonline.com\/article\/2597922\/data-protection\/what-happened-to-the-flashback-trojan-turns-out-us-universities-are-still-riddled.html#tk.rss_dataprotection\" target=\"_blank\" rel=\"nofollow\">reports emerged<\/a> that claimed US universities were riddled with old malware &#8211; including Flashback and the Windows Conficker worm.<\/p>\n<p>Security firm BitSight decided to compare infections at large universities participating in the SEC, ACC, Pac-12, Big 10, Big 12 and Ivy League sporting conferences. In all, the firm claims to have covered 2.25 million students and 11 million IP addresses on college campuses. They\u00a0reported the following:<\/p>\n<blockquote><p>Higher education institutions experience high levels of malware infections, the most prevalent infection coming from the Flashback malware, which targets Apple computers. Other prominent malware include Ad-ware and Conficker.<\/p><\/blockquote>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-31141\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/mortar-board-170.jpeg\" alt=\"Mortar board\" width=\"170\" height=\"170\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/mortar-board-170.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/mortar-board-170-150x150.jpeg 150w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>I spoke to Intego malware researcher Andrew Mitchell to see whether he felt we should still be fearful of Flashback, and why educational establishments might have been particularly troubled by the notorious malware.<\/p>\n<p>&#8220;Unlike the rest of the universities networks, dorm networks are often unsecured and open once you\u2019re physically inside the dorm. In other words, once something gains access to one machine, it&#8217;s easy to find its way onto others,&#8221; began Mitchell.<\/p>\n<p>&#8220;In addition, there are more old machines running there than elsewhere. Not every student can afford the latest and greatest laptop, and you\u2019ll find more older machines in this population than elsewhere as families try to eek out the most from limited budgets.&#8221;<\/p>\n<p>&#8220;Futhermore, many kids have never been responsible for updating their machines to the latest security updates, it&#8217;s been their parents&#8217; responsibility, and now it&#8217;s up to them and they simply don\u2019t worry about it.&#8221;<\/p>\n<p>&#8220;Finally, we have to consider promiscuous computing,&#8221; the researcher quipped. &#8220;Kids are much more likely to share files, regardless of their origin, and as a result, this stuff spreads easily.&#8221;<\/p>\n<p>But, it seems the Flashback problem isn&#8217;t one that should be troubling most of us.<\/p>\n<p>Apple now offers free updates to its operating system, and Mitchell says that the only computers at risk from Flashback anymore are Power PC and first generation (non-64 bit) Intel-based Macs. The fact that Apple no longer distributes Java, and the decline in applications and websites that demand Java mean that less people are going to go to the effort to install it themselves.<\/p>\n<p>In summary &#8211; yes, Flashback remains a threat. But for most of us, it&#8217;s a threat that we don&#8217;t have to worry about.<\/p>\n<p>If you know someone who has an older Mac, or who is not likely to be doing a good job at keeping their computer protected with the latest patches and security software, be a good friend and offer them some help.<\/p>\n<p>Together we can help to eradicate older threats like Flashback once and for all from the internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?<\/p>\n","protected":false},"author":34,"featured_media":31198,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[153,75,86,859],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flashback to the Biggest Mac Malware Attack of All Time\u2014Is it Still a Threat? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-26T16:57:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:46:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/\",\"name\":\"Flashback to the Biggest Mac Malware Attack of All Time\\u2014Is it Still a Threat? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#primaryimage\"},\"datePublished\":\"2014-08-26T16:57:22+00:00\",\"dateModified\":\"2016-02-12T18:46:02+00:00\",\"description\":\"Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flashback to the Biggest Mac Malware Attack of All Time\\u2014Is it Still a Threat?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Flashback to the Biggest Mac Malware Attack of All Time\\u2014Is it Still a Threat?\",\"datePublished\":\"2014-08-26T16:57:22+00:00\",\"dateModified\":\"2016-02-12T18:46:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#webpage\"},\"wordCount\":862,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg\",\"keywords\":[\"Flashback\",\"Java\",\"Malware\",\"OSX\/Flashback\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/","og_locale":"en_US","og_type":"article","og_title":"Flashback to the Biggest Mac Malware Attack of All Time\u2014Is it Still a Threat? - The Mac Security Blog","og_description":"Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-08-26T16:57:22+00:00","article_modified_time":"2016-02-12T18:46:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/","name":"Flashback to the Biggest Mac Malware Attack of All Time\u2014Is it Still a Threat? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#primaryimage"},"datePublished":"2014-08-26T16:57:22+00:00","dateModified":"2016-02-12T18:46:02+00:00","description":"Should we still be fearful of Flashback and why might educational establishments be particularly troubled by the notorious Mac malware?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flashback to the Biggest Mac Malware Attack of All Time\u2014Is it Still a Threat?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Flashback to the Biggest Mac Malware Attack of All Time\u2014Is it Still a Threat?","datePublished":"2014-08-26T16:57:22+00:00","dateModified":"2016-02-12T18:46:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#webpage"},"wordCount":862,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg","keywords":["Flashback","Java","Malware","OSX\/Flashback"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-still-threat\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/flashback-still-threat-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-868","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31132"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=31132"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31132\/revisions"}],"predecessor-version":[{"id":31234,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31132\/revisions\/31234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/31198"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=31132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=31132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=31132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}