Apple, which usually doesn’t get involved much in security issues outside of issuing patches when needed, said it is working with internet service providers around the world to disable the Flashback botnet’s command and control servers.
Flashback exploits a security flaw in Java, Apple explains, but it also relies on computer servers hosted by the malware’s authors. It is these servers that the tech giant seeks to disable. Apple also says it is in the process of developing a tool that can detect and remove the Flashback malware.
The move to partner with ISPs, and presumably law enforcement, is reminiscent of recent operations spearheaded by Apple’s long-time rival, Microsoft. The Redmond-based computer company has, of late, developed something of a reputation for decapitating, or otherwise maiming botnets in concert with ISPs, law enforcement, and other companies.
The Flashback trojan, of course, has been the talk security industry since its Mac-targeting variant emerged in late February. Shortly thereafter, reports emerged suggesting that the Flashback trojan fuels a network of 500,000 infected machines, making it the most successful piece of Mac malware to date.