Apple reportedly tries to shut down Flashback discoverer's serverIn what may be a case of mistaken identity, it was revealed on Tuesday that Apple attempted to shut down a server belonging to the security firm that first discovered the Flashback malware, giving insight into how the Cupertino, Calif., company handles third-party assistance.
Boris Sharov, chief executive of the relatively unknown Russian security firm Dr. Web, was notified by web registrar Reggi.ru on Monday that Apple had requested the shut-down of a domain belonging to the Moscow company on claims that it was being used as a "command and control" for Macs affected by Flashback, reports Forbes.
They told the registrar this [domain] is involved in a malicious scheme. Which would be true if we werent the ones controlling it and not doing any harm to users, Sharov said. This seems to mean that Apple is not considering our work as a help. Its just annoying them.
The domain in question was one of three Dr. Web was using to monitor the spread of Flashback in what researchers call a "sinkhole," or a spoofed command and control server. This technique allowed the firm to first uncover the trojan that has so far rooted into an estimated 600,000 machines, more than one percent of all operating Macs.
Apple may have prematurely requested the shutdown, which is standard practice in this type of security scenario, before further investigating the background of the server and Sharov believes that the move was merely a mistake.
Adding to the confusion is Apple's notoriously secretive nature. Sharov said that his company has dealt with the oft-maligned Microsoft on similar situations which, unlike Apple, has fostered fruitful working relationships with outside security firms. Apple has not seen a botnet of this scope and therefore does not share the same ties with outside security sources, he adds.
For Microsoft, we have all the security response teams addresses, Sharov said. We dont know the antivirus group inside Apple.
Dr. Web chief executive Boris Sharov. | Source: Forbes
By shutting down command and control servers, Apple is looking to quash Flashback, which in its current iteration has created a worldwide botnet by exploiting an unpatched Java vulnerability.
Apple recently pushed out two successive Java updates last week in an attempt to catch up with the malware, but some see the move as too little too late.
Their response should have been much earlier when they should have updated their Java, Sharov said. Now calling registrars to shut down domains is not as important. The infection has already taken place. There are dozens of domains [controlling] the botnet. Shutting down one does nothing.
Apple remains closed for comment, and hasn't released any official statement regarding Flashback.
These are not pleasant days for them, Sharov said. Theyre not thinking about us. The safety of Macintosh computers is going down very quickly, and theyre thinking what to do next. Theyre thinking about how to manage a future where the Mac is no longer safe.
On Topic: General
- This week on AI: New MacBook Pro rumors, Apple's answer to Echo, Apple Car charging & more
- Apple details efforts to ease environmental impact at Irish data center
- Jawbone said to end fitness tracker sales, may sell off speaker business [u]
- AirPort Extreme, Time Capsule pulled from U.S. Apple Stores
- Congress won't consider mandatory encryption bill after Apple battle - report