borg110 om 17:39, 20-04-2012wordt toch even wakker fanboys! Wie van jullie heeft niet even stiekem gecheckt of je besmet was of niet?
Robert om 13:00, 19-04-2012in het draadje waar we vroegen of er hier iemand er last van had, niemand dat bevestigd heeft...
Robert om 9:37, 21-04-2012Je zou het misschien niet van mij verwachten, maar ik ben het eigenlijk wel eens met borg110. Ook ik heb het gevoel dat veel forumleden de AV-bedrijven wel erg makkelijk de schuld geven en dit niet serieus genoeg nemen.
Robert om 15:06, 21-04-2012Misschien dat er een apart nieuwsbericht moet komen over de idioot grote verschillen tussen de metingen van de verschillende AV-bedrijven..?
DNS Redirection Protects Against Flashback Malware, Leads to False Infection RatesInvestigations by Intego and others have turned up some interesting information which explains why different sinkholes are providing different numbers of infected Macs. (See our blog post earlier today, Flashback Mac Infection Rates Underestimated.) As mentioned above, the Flashback malware looks for specific domains with the .com, .net, .info, .in and .kz top-level domains. It seems that for some of these domains, Dr Web's sinkhole is trapping infected Macs. Yet for the other domains - those with .net, .in and .kz - testing shows that the specific domains that the Flashback malware attempts to contact resolve to the IP address 127.0.0.1, or localhost (that is, the infected Mac itself).It looks as though action has been taken with companies responsible for root nameservers to block the domains that the Flashback malware attempts to contact, and redirects these requests to the users' Macs. The effect here is that the Macs are still infected, but they will not be able to contact the command and control servers, and, especially, cannot be counted by sinkholes. However, we cannot have any idea of the real scope of the Flashback malware infection.