We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Flashback Mac Trojan earned $14,000 from ad clicks, Symantec

Symantec writes that it now has a clearer idea of how many ads the attackers were displaying and how much those ads earned

Symantec originally thought that at its peak the Flashback Trojan was generating around $10,000 a day by hijacking ad clicks. Now, new research suggests the developers may only have earned $14,000 during the time that the malware was active.

In its Connect blog, Symantec explains: "We now have a much clearer idea of how many ads the attackers were displaying and how much those ads earned for the attackers."

"From our analysis we have seen that, for a three-week period starting in April, the botnet displayed over 10 million ads on compromised computers but only a small percentage of users who were shown ads actually clicked them, with close to 400,000 ads being clicked."

These 400,000 ad clicks earned the attackers "$14,000 in these three weeks," according to Symantec.

The security firm notes: "It is worth mentioning that earning the money is only one part of the puzzle - actually collecting that money is another, often more difficult, job. Many PPC providers employ anti-fraud measures and affiliate-verification processes before paying. Fortunately, the attackers in this instance appear to have been unable to complete the necessary steps to be paid."

Symantec estimates that the actual ad-clicking component of Flashback was only installed on about 10,000 of the more than 600,000 infected machines. "In other words, utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year," the security firm claims.

Symantec goes on to explain how Click Fraud, as utilised by the Flashback Trojan, works. "Compromised computers pass users' search keywords to the attackers. The attackers then contact various pay per click (PPC) services and route the ads from the PPC providers to the compromised computer in the process earning money for those ads from the PPC providers."

"Over 98% of the ads being sent to compromised computers appear to originate from the same PPC provider," according to Symantec.

Symantec claims: "The attackers are taking advantage of both users and the PPC providers by getting paid for ads that may not have been seen by users and may not be relevant to what the user searched for."

"The OSX.Flashback bot-master hijacked Google's search results and displayed their own PPC search results to create conversions," says Symantec. "The attackers still managed to display over 10 million ads in a three week period, generating $14,000 in revenue."

The report concludes: "Although per-per-click botnets are not a new idea we have seen them on Windows for years as the market share of Mac increases, we will see more Mac-related botnets similar to this one in the future."

IDG UK Sites

LG G4 Note UK release date and specification rumours: Samsung Galaxy Note 5 killer could be the LG 3......

IDG UK Sites

In defence of BlackBerrys

IDG UK Sites

Why we should reserve judgement on Apple ditching Helvetica in OS X/iOS for the Apple Watch's San...

IDG UK Sites

Retina 3.3GHz iMac 27in preview: Apple cuts £400 off Retina iMac with new model