OSX.FalshBack.K Was Created For Google Ad-Click

Refer to previous introduction on the OSX.FalshBack.K.

Symantec has just published a more detailed overview and inner workings.

It is interesting to take note this time that the ultimate goal of the OSX.Flashback.K Trojan is to generate money through ad-clicking.

It works on the basis of generating dynamic URLs as a form of reporting-back-to-the -HQ. These URLs are known as C & C (command and control) server addresses.

Once the HQ gained control of the infected PC, it will perform hijack on Google Ad-click.

This security threat makes a good case study for computer science and software engineering.

Comments