Lessons for IT, Apple in Flashback brouhaha

By Ryan Faas

While the number of Macs infected by the Flashback malware is seemingly in decline now, the security reverberations for Apple continue. The discovery of the botnet a couple of weeks ago — and Apple’s response — has prompted criticism by IT security pros, concern among Mac users and even some smug told-you-so’s from Windows users who’ve watched for years while Apple and its fans derided the the omnipresent malware issues plaguing PCs.

Security by obscurity, if it ever existed, is no more.

Now that Apple and several third-party software firms have produced detection and removal tools, it’s time to take stock of the situation and dig a little deeper. What does the Flashback debacle mean for Mac users, Apple itself and the businesses that have increasingly adopted Macs? And does it affect those with iPads and iPhones?

Let’s start with a reality check. The only reason this story got the attention it did is because for more than a decade Mac OS X has not been hit hard with any major malware threat. There have been some proof-of-concept pieces written; plenty of Macs have been infected with Microsoft Office macro viruses (that generally have no damaging effects on Macs, especially those running Office 2008, which didn’t offer macro support); and there have been a couple of genuine malware alerts that didn’t amount to a serious online threat.

A piece of malware like Flashback that targeted Windows PCs would’ve been a minor story in tech circles that ended with reports of anti-virus companies releasing updated malware definitions, Microsoft releasing a patch for the underlying vulnerability, and possibly a free detection and removal tool being pushed out to users. This is something that happens in the PC world all the time. But not on the Apple side of the equation.

Given the thousands of malware threats facing Windows PCs, this is barely a drop in the bucket. As a result, Apple came under much closer scrutiny than any other major company would have been in similar circumstances.
The good and the bad of Apple’s response

Apple may have been subjected to more scrutiny than Microsoft, but there were some telling points in how it handled the situation.

First, the company made the unfortunate choice of trying to shut down the domain used by Dr. Web researchers seeking to determine the extent of the infection. A generous take would be that Apple took a misstep because this is a new experience for it. A more jaundiced view would be that Apple was trying to minimize information about the extent of Flashback infections. (The truth is probably somewhere in between.)

This much is clear: Apple didn’t handle the initial situation well.

That said, it quickly released a fix as soon as its engineers could create the patch, made needed corrections immediately after that, and ultimately released tools that would protect uninfected Macs and remove any infections. Apple did this by leveraging its software update infrastructure so that users who regularly agree to accept Apple’s Software Update notices were protected — even if they had never heard of the threat.

Ultimately, the company dealt with the problem in a way that protected the most non-technical of users and did so at no cost to them.

Whether you like Apple or not, the move shows commitment to its users. Sure, it could have issued an initial patch, scheduled a follow-up release later on, and never looked back, but it didn’t.

Still, Apple could’ve been more forthcoming and engaged the security industry more fully. Not doing so was typical of the company’s propensity to keep all information to itself until its executives feel comfortable that they have the best solution at hand. Usually, that works to Apple’s advantage. Not so this time.

Apple also focused its efforts around current Macs and the most recent releases of OS X. That isn’t surprising. The company has been pretty open and consistent in pushing its platform forward and not offering extensive backwards compatibility.
What about security and antivirus companies?

One of the striking parts of this story was that almost none of the security and antivirus vendors offered up a solution much quicker than Apple did. F-Secure, which provided instructions for detecting the malware early on, was the first major security vendor to offer a quarantine and removal tool. Kaspersky and Symantec followed in quick succession. Apple’s offering followed them.

Original ComputerWorld.com Article.

Our Take: Security by Obscurity as mentioned in the article is a joke – it never existed, and relying on it is a fool’s game. Apple is partially to blame for this – their corporate culture lead to ads which claimed how virus-free they were, and that eventually lead to their users believing they were somehow “immune” – well they never were, and it took an outbreak of this magnitude to prove it.

All computer users need multi-layered security – those who “get it” – will “get it” – those that don’t, are tomorrow’s identity theft victims.

Ready for the right solutions?

It’s time to offload your technology troubles and security stress.

"*" indicates required fields