Return-Path: Received: from nk11p00mm-asmtp006.mac.com ([17.158.161.5] verified) by media-motion.tv (CommuniGate Pro SMTP 4.2.10) with ESMTP id 4678155 for AE-List@media-motion.tv; Fri, 06 Apr 2012 15:20:21 +0200 MIME-version: 1.0 Content-type: multipart/alternative; boundary="Boundary_(ID_RhLaB5eNMP5o53Nxnx5qJg)" Received: from [192.168.1.68] (99-152-153-100.lightspeed.dllstx.sbcglobal.net [99.152.153.100]) by nk11p00mm-asmtp006.mac.com (Oracle Communications Messaging Server 7u4-23.01(7.0.4.23.0) 64bit (built Aug 10 2011)) with ESMTPA id <0M22005HR7QNYO70@nk11p00mm-asmtp006.mac.com> for AE-List@media-motion.tv; Fri, 06 Apr 2012 13:20:48 +0000 (GMT) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.6.7498,1.0.260,0.0.0000 definitions=2012-04-05_06:2012-04-05,2012-04-05,1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 suspectscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=6.0.2-1012030000 definitions=main-1204060105 From: Jim Curtis Subject: Re: [AE] Software Update Breaks MP Rendering? Date: Fri, 06 Apr 2012 08:20:47 -0500 In-reply-to: To: After Effects Mail List References: Message-id: X-Mailer: Apple Mail (2.1084) --Boundary_(ID_RhLaB5eNMP5o53Nxnx5qJg) Content-type: text/plain; CHARSET=US-ASCII Content-transfer-encoding: 7BIT On Apr 5, 2012, at 4:57 PM, Jim Curtis wrote: > Uh oh. I did the update, too. In response to this: > > http://gizmodo.com/5899352/mac-flashback-trojan-find-out-if-youre-one-of-the-600000-infected > A bit more info. Actually, what prompted me to run Software Update was this message I got from Sewelltech that contained the link above. The pertinent info is that the virus attempts to infect you by way of a bogus Flash installer. Adobe should be very concerned about this mis-use of their corporate identity: " Security Update OSX/Flashback.K Flashback.K, as the latest variant is called, is able to hijack Macs even when users don't enter an administrative password. Instead, it does this by exploiting a critical Java vulnerability classified as CVE-2012-0507, F-Secure researchers wrote in a blog post. Although Oracle released a fix for the security threat in February. Flashback first surfaced in September as a trojan that masqueraded as an installer for Adobe's Flash Player. Over the past few months, it has taken on increasingly sophisticated features, including the ability to bypass built-in OS X malware protections and attack code that exploits long-ago patched Java vulnerabilities. The version analyzed by F-Secure is the first known time Flashback has exploited a vulnerability for which no fix is currently available. Although Apple stopped bundling Java by default in OS X 10.7 (Lion), it offers instructions for downloading and installing the Oracle-developed software framework when users access webpages that use it. F-Secure has recently joined others in counseling Mac users to disable Java on machines that don't regularly use it. The antivirus provider also has provided instructions for checking if your Mac is infected. Read this for more info on the Flashback malware How to check if you are affected Updates and Downloads Patches Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 Update 7 Downloads OS X 10.6 OS X 10.7 If all of this sounds foreign to you or you need help checking or securing you Mac Systems Please Click Here to contact Sewelltech or give us a call at 214-845-8198, if we can answer any questions regarding this or any Apple service and sales needs. If you are covered under a Seweltlech Service And Maintenance Agreement, no need to worry your systems have already been tested and patched. David Sewell Sewelltech, Inc. " I can affirm that I've visited web sites in the past few weeks, and a pop-up told me that I didn't have Flash installed, and asked me if I want to install it. I dismissed them, because I know Flash is installed. That may have been a lucky fluke on my part. I just ran an Ae render, and MP was working fine. Jim C. --Boundary_(ID_RhLaB5eNMP5o53Nxnx5qJg) Content-type: text/html; CHARSET=US-ASCII Content-transfer-encoding: quoted-printable


A bit more info. =  Actually, what prompted me to run Software Update was this message = I got from Sewelltech that contained the link above.  The pertinent = info is that the virus attempts to infect you by way of a bogus Flash = installer.  Adobe should be very concerned about this mis-use of = their corporate = identity:

"

Security Update = OSX/Flashback.K
Flashback.K, as the latest variant is called, = is able to hijack Macs even when users don't enter an administrative = password. Instead, it does this by exploiting a critical Java = vulnerability classified as CVE-2012-0507, F-Secure researchers wrote in = a blog post. Although Oracle released a fix for the security threat in = February. 

Flashback first surfaced in September as a trojan = that masqueraded as an installer for Adobe's Flash Player. Over the past = few months, it has taken on increasingly sophisticated features, = including the ability to bypass built-in OS X malware protections and = attack code that exploits long-ago patched Java vulnerabilities. The = version analyzed by F-Secure is the first known time Flashback has = exploited a vulnerability for which no fix is currently = available. 

Although Apple stopped bundling Java by default = in OS X 10.7 (Lion), it offers instructions for downloading and = installing the Oracle-developed software framework when users access = webpages that use it. F-Secure has recently joined others in counseling = Mac users to disable Java on machines that don't regularly use it. The = antivirus provider also has provided instructions for checking if your = Mac is infected. 


Read this for more = info on the Flashback malware 

How to check if you are affected 

Updates = and Downloads Patches 
Java for OS X Lion 2012-001 and Java for Mac OS X 10.6 = Update 7 
Downloads 
OS X 10.6 
OS X 10.7 

If all of = this sounds foreign to you or you need help checking or securing you Mac = Systems Please Click Here to contact = Sewelltech or give us a call at 214-845-8198, if we can answer = any questions regarding this or any Apple service and sales = needs. 

If you are covered under a Seweltlech Service And = Maintenance Agreement, no need to worry your systems have already been = tested and patched.
 

David Sewell 
Sewelltech, = Inc. 

= "

I can affirm that I've visited web sites in the past few = weeks, and a pop-up told me that I didn't have Flash installed, and = asked me if I want to install it.  I dismissed them, because I know = Flash is installed.  That may have been a lucky fluke on my = part.

I just ran an Ae render, and MP was = working fine.

Jim = C.



= --Boundary_(ID_RhLaB5eNMP5o53Nxnx5qJg)--