	{"id":4402,"date":"2012-04-06T17:10:28","date_gmt":"2012-04-07T00:10:28","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4402"},"modified":"2016-02-12T10:17:06","modified_gmt":"2016-02-12T18:17:06","slug":"flashback-is-not-a-trojan-horse-what-is-it","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/","title":{"rendered":"Flashback Is Not a Trojan Horse; What Is It?"},"content":{"rendered":"<p>The Flashback malware, which <a href=\"https:\/\/www.intego.com\/mac-security-blog\/hundreds-of-thousands-of-macs-infected-by-flashback-malware\/\">may have infected more than a half-million Macs already<\/a>, has been getting a lot of attention in the press. But many media are calling it the &#8220;Flashback Trojan,&#8221; or even a &#8220;Trojan virus.&#8221; Is it correct to use these terms?<\/p>\n<p>Well, Flashback is not a Trojan horse. (It is also not a virus, nor a &#8220;Trojan virus,&#8221; as some media are saying.) While the distinction is, perhaps, not important if you have been infected by this malware, it actually is useful to know.<\/p>\n<p>A Trojan horse is malware hidden in something that you have downloaded, or have received by e-mail. You think it&#8217;s something useful &#8211; an application or a file &#8211; but when you open it, even though it might <i>seem<\/i> to do something useful, it actually installs malware. Many Trojan horses use &#8220;social engineering&#8221; to trick users into opening them. This was the case with the earliest version of the Flashback malware, which Intego discovered in September, 2011. At the time, Flashback <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-september-26-2011-mac-flashback-trojan-horse-masquerades-as-flash-player-installer-package\/\">masqueraded as a Flash Player installer<\/a>. A later variant also pretended to be <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-flashback-variant-changes-tack-to-infect-macs\/\">changed tactics to infect Macs<\/a> by pretending to be Apple&#8217;s Software Update tool.<\/p>\n<p>But recent versions of Flashback &#8211; the name has remained the same because the underlying malware code is similar &#8211; have been using <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-flashback-variant-takes-advantage-of-unpatched-java-vulnerability\/\">Java vulnerabilities to infect Macs<\/a>.<\/p>\n<p>The difference between these two methods is important. In the first method, users are tricked into launching something which then infects their Macs. In the second, a &#8220;drive-by download&#8221; takes advantage of a vulnerability to install, in many cases, without users being aware that anything has happened. (And the actual malware that is installed is called a &#8220;backdoor,&#8221; because it opens ports on an infected computer enabling remote users to access those computers and the data they contain.)<\/p>\n<p>Drive-by downloads occur when users visit poisoned web sites. In many cases, it&#8217;s not even the web sites themselves that are tainted; it could be ads or videos that are embedded in web pages on these sites that serve the malware.<\/p>\n<p>So, <b>malware<\/b> &#8211; in this case a backdoor &#8211; is the payload; that&#8217;s the nasty stuff that cyber-criminals want to get on your Mac. <b>Trojan horses<\/b> and <b>drive-by downloads<\/b> are delivery methods; that&#8217;s how the bad guys get the nasty stuff on your Macs.<\/p>\n<p>Users need to know not to open files they get unexpectedly by e-mail, and not to launch applications that they find in their Downloads folder without them having downloaded them. But other than not using the web, the only way to protect against drive-by downloads is to use <a href=\"https:\/\/www.intego.com\/virusbarrier\">Mac antivirus software, such as Intego VirusBarrier X6<\/a>, to ensure that no nasty files get onto your Mac.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?<\/p>\n","protected":false},"author":3,"featured_media":8755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[153,86,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flashback Is Not a Trojan Horse; What Is It? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-07T00:10:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:17:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/\",\"name\":\"Flashback Is Not a Trojan Horse; What Is It? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#primaryimage\"},\"datePublished\":\"2012-04-07T00:10:28+00:00\",\"dateModified\":\"2016-02-12T18:17:06+00:00\",\"description\":\"What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flashback Is Not a Trojan Horse; What Is It?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Flashback Is Not a Trojan Horse; What Is It?\",\"datePublished\":\"2012-04-07T00:10:28+00:00\",\"dateModified\":\"2016-02-12T18:17:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#webpage\"},\"wordCount\":459,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"keywords\":[\"Flashback\",\"Malware\",\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/","og_locale":"en_US","og_type":"article","og_title":"Flashback Is Not a Trojan Horse; What Is It? - The Mac Security Blog","og_description":"What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-04-07T00:10:28+00:00","article_modified_time":"2016-02-12T18:17:06+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/","name":"Flashback Is Not a Trojan Horse; What Is It? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#primaryimage"},"datePublished":"2012-04-07T00:10:28+00:00","dateModified":"2016-02-12T18:17:06+00:00","description":"What exactly is the Flashback malware? Is it a Trojan horse? Or is it a different type of malware?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flashback Is Not a Trojan Horse; What Is It?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Flashback Is Not a Trojan Horse; What Is It?","datePublished":"2012-04-07T00:10:28+00:00","dateModified":"2016-02-12T18:17:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#webpage"},"wordCount":459,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","keywords":["Flashback","Malware","Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-is-not-a-trojan-horse-what-is-it\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-190","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4402"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4402"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4402\/revisions"}],"predecessor-version":[{"id":36892,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4402\/revisions\/36892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8755"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}