{"id":4443,"date":"2012-04-13T17:27:28","date_gmt":"2012-04-14T00:27:28","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4443"},"modified":"2012-11-14T16:22:49","modified_gmt":"2012-11-14T23:22:49","slug":"how-do-i-detect-and-remove-flashback","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/","title":{"rendered":"How Do I Detect and Remove Flashback?"},"content":{"rendered":"<p>There have been many articles over the past few weeks, about the various new Flashback variants. This has raised the visibility of the Mac malware situation, which is a good thing as there have been threats actively circulating in the Mac world for years now. Users are being infected, yet security knowledge among Mac users had not kept pace with that reality. Now more people understand that Macs have never been immune to malware.<\/p>\n<p>Many reputable sources have published thorough, technical articles about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.<\/p>\n<p>The latest variants of Flashback are silent; you may never be aware that you&#8217;re infected unless you specifically look for signs of infection. You don&#8217;t have to download strange files, and you don&#8217;t have to enter your administrator password for it to install. Surfing to a compromised site is all it takes, and this could be something as innocuous as going to your friend&#8217;s blog that hasn&#8217;t been updated with the latest security patches. Exploiting a Java vulnerability, Flashback silently installs and downloads components which work in the background whenever an infected computer is connected to the Internet.<\/p>\n<p>As a result of the recent press, many people want to know how to detect and remove a Flashback infection. As there are now many different variants, this is a complicated question to answer. The consequences of misidentifying and incorrectly modifying your Mac can be serious system instability. There are now several companies that offer free scanner tools that will find and safely remove all known Flashback variants.<\/p>\n<p>Here is our own <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-offers-free-software-for-detecting-all-variants-of-flashback-malware\/\">tool to help you with detection, removal and protection against future infection<\/a>. This works not only against all known Flashback variants, but other Mac malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.<\/p>\n","protected":false},"author":6,"featured_media":3673,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[66,80,86,141,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do I Detect and Remove Flashback? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-14T00:27:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-11-14T23:22:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/\",\"name\":\"How Do I Detect and Remove Flashback? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#primaryimage\"},\"datePublished\":\"2012-04-14T00:27:28+00:00\",\"dateModified\":\"2012-11-14T23:22:49+00:00\",\"description\":\"There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do I Detect and Remove Flashback?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"How Do I Detect and Remove Flashback?\",\"datePublished\":\"2012-04-14T00:27:28+00:00\",\"dateModified\":\"2012-11-14T23:22:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#webpage\"},\"wordCount\":320,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"keywords\":[\"Intego\",\"Mac OS X\",\"Malware\",\"VirusBarrier X6\",\"Vulnerability\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/","og_locale":"en_US","og_type":"article","og_title":"How Do I Detect and Remove Flashback? - The Mac Security Blog","og_description":"There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-04-14T00:27:28+00:00","article_modified_time":"2012-11-14T23:22:49+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/","name":"How Do I Detect and Remove Flashback? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#primaryimage"},"datePublished":"2012-04-14T00:27:28+00:00","dateModified":"2012-11-14T23:22:49+00:00","description":"There have been many thorough, technical articles over the past few weeks about the Flashback malware. This post is for those of you who just want a quick article to explain how you can check to see if your Mac is infected, and how you can protect yourself.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Do I Detect and Remove Flashback?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"How Do I Detect and Remove Flashback?","datePublished":"2012-04-14T00:27:28+00:00","dateModified":"2012-11-14T23:22:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#webpage"},"wordCount":320,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","keywords":["Intego","Mac OS X","Malware","VirusBarrier X6","Vulnerability"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-do-i-detect-and-remove-flashback\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-19F","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4443"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4443"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4443\/revisions"}],"predecessor-version":[{"id":7178,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4443\/revisions\/7178"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/3673"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}