Contrary to reports by several security companies, the Flashback botnet is not shrinking, the Russian antivirus firm that first reported the massive infection three weeks ago claims.

@Yungjohnnybravo @TatWZA

Dr. Web, which earlier this month was the first to report the largest-ever successful malware attack against Apple’s OS X, said Friday that the pool of Flashback-infected Macs still hovers around the 650,000 mark, and that infections are continuing.

Also on Friday, Liam O Murchu, director of operations at Symantec’s security response center, confirmed that Dr. Web’s numbers were correct.

Optimism Refuted

Both Dr. Web’s tally and its contention that infections are ongoing flew in the face of other antivirus companies’ assertions. Kaspersky Lab and Symantec, which have each “sinkholed” select domains — hijacked them before the hackers could use them to issue orders to compromised machines — used those domains to count the Macs that try to communicate with the malware’s command-and-control centers

Earlier this week, Symantec said the Flashback botnet had shrunk by 60 percent and was down to 142,000 machines. Kaspersky claimed that its count registered only 30,000 infected Macs.

Not even close, said Dr. Web in a Friday blog post.

“The number is still around 650,000,” said Dr. Web.

On April 16, the company continued, it said 595,000 different Macs were registered on the botnet, while the next day, April 17, the count was over 582,000.

Symantec’s O Murchu said Dr. Web is right.

“We’ve been talking with them about the discrepancies in our numbers and theirs,” said O Murchu in an interview Friday. “We now believe that their analysis is accurate, and that it explains the discrepancies.”

When asked for comment, Kaspersky Lab said it was looking into the matter.

Malware Outsmarts Monitors

According to Dr. Web, counts by others were incorrect because of how the malware calculates the locations of command-and-control (C&C) servers, and how it communicates, or tries to, with those domains.

Dr. Web said it had sinkholed the primary Flashback C&C domains at the beginning of the month, and that after an infected Mac asks those servers — controlled by Dr. Web — for instructions, they then reach out to another domain.

 

Dr. Web said it did not know who controlled that follow-up domain, but O Murchu suspected it is another security company or researcher.

But Dr. Web did know what happens next in Flashback’s complex communication scheme.

“This server communicates with bots but doesn’t close a TCP connection,” wrote Dr. Web. “As [a] result, bots switch to the stand-by mode and wait for the server’s reply and no longer respond to further commands. As a consequence, they do not communicate with other command centers, many of which have been registered by information security specialists [including Kaspersky and Symantec].

“This is the cause of controversial statistics,” said Dr. Web.

Firms that reported a decrease in the Flashback botnet attributed the decline to the Java update that Apple distributed April 3, the detect-and-delete tool it shipped on April 12, similar tools issued by several antivirus vendors and the intense media attention paid to the outbreak.

Dr. Web’s numbers hint that all of that was in vain.

Flashback’s primary attack vector has been a Java vulnerability that Oracle patched in February, but Apple fixed only seven weeks later. Apple maintains its own version of Java for Mac OS X.

The French security company Intego first spotted the Flashback variant that exploited the then-unpatched Java bug in late March.

[pcw]