New in OS X: Get MacRumors Push Notifications on your Mac

Resubscribe Now Close

Security Firm Symantec Analyzes the Profitability of the OSX.Flashback Botnet

Security firm Symantec previously estimated that the authors of the Flashback malware that affected hundreds of thousands of Macs at its peak could have been generating up to $10,000 per day by hijacking users' ad clicks. Further analysis from the company suggests that the developers may have only earned $14,000 over the three weeks the malware was active.
From our analysis we have seen that, for a three-week period starting in April, the botnet displayed over 10 million ads on compromised computers but only a small percentage of users who were shown ads actually clicked them, with close to 400,000 ads being clicked. These numbers earned the attackers $14,000 in these three weeks, although it is worth mentioning that earning the money is only one part of the puzzle—actually collecting that money is another, often more difficult, job. Many PPC providers employ anti-fraud measures and affiliate-verification processes before paying. Fortunately, the attackers in this instance appear to have been unable to complete the necessary steps to be paid.

It is estimated the actual ad-clicking component of Flashback was only installed on about 10,000 of the more than 600,000 infected machines. In other words, utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year.
Symantec notes that the malware developers displayed more than 10 million hijacked ads and could have delivered many more if the developers had been more successful in their attacks.

Some security specialists have said that the Mac OS is "really vulnerable" to further infections, though these claims should perhaps be taken with a grain of salt -- those security specialists make their living off vulnerabilities and it is in their best interest to promote awareness of them.

Top Rated Comments

(View all)

33 months ago

those security specialists make their living off vulnerabilities, and it is in their best interest to promote awareness of them.


I'll say. The more afraid we are, the more we'll pay for their placebo security software.

I say the best security is knowing how to avoid infections in the first place. If you can learn not to download mysterious files, you're half way there.
Rating: 8 Votes
33 months ago

I wish I made $14,000 in 3 weeks :(


Your maths is wrong.

This isn't one person making $14,000 profit for three weeks of work. There is a lot more work than three weeks of hacking, with many more people involved, for a scheme that managed to produce $14,000 in revenue for three weeks and then fizzled out. A complex software project producing a total of $14,000 in revenue.

I did a quick calculation using the total annual revenue of my company and the number of developers employed, using a number of 230 working days, and I couldn't spend more than three or four days of work for one developer for $14,000 revenue.

I wouldn't be surprised if websites like macrumors did get more additional ad revenue due to people reading stories about flashback and clicking on ads on macrumors, than these hackers made.

PS. Seems at least one of those hackers was angry because I told them they are stupid and doing a lot of work for very little money.
Rating: 6 Votes
33 months ago

Thanks StrikerShoot, I love a good infographics, but I have a good understanding of the threats Malware poses, and likewise the criminal mind behind a hacker. I'm thinking Godfather 3 style, going legit.

I was thinking without all the malicious aspects, voluntary opt-in Adnets where you technically farm all their clicks, think of it as an investment opportunity with micro returns. Micro input, micro returns. Still returns!

It sounds heaps like a scheme/existing web advertising but with the user opted-in, subscription based system.


A lot of malware / phishing scams are run by organized crime in Russia.
Rating: 5 Votes
33 months ago

This has got to be a business model right.

Ad-hijacking. Earn heaps through people clicking on Ads, invest, profit, repay people.


Considering how Flashback infects Macs, seems like a hackers' basic business model to me..

Rating: 4 Votes
33 months ago
It would be a cold day in hell before I would ever buy a Symantec product for mac. Their PC editions are resource killing crap. I would put MSE up against them any day.
Rating: 4 Votes
33 months ago

What fraction of 1% of the Mac user base does 10000 represent?


I'd estimate the OS X install base at ~50M, so 10k/50M is 0.02%. Using common sense, 0.02% infection does not an susceptible OS make, but remember, there's always money in fear.
Rating: 3 Votes
33 months ago
Some security specialists have said that the Mac OS is "really vulnerable" to further infections, though these claims should perhaps be taken with a grain of salt -- those security specialists make their living off vulnerabilities and it is in their best interest to promote awareness of them.

Would this not be true of Windows too?
Rating: 3 Votes
33 months ago

I'll say. The more afraid we are, the more we'll pay for their placebo security software.

I say the best security is knowing how to avoid infections in the first place. If you can learn not to download mysterious files, you're half way there.


human stupidity can't be cure with world best anti-virus software.
Rating: 3 Votes
33 months ago

I'm waiting for the next story about how an antivirus software update goes bad and destroys the system. Those are always fun to hear about.


That was yesterday. Does that count as "the next story"? Headline: "'Catastrophic' Avira antivirus update bricks Windows PCs"

http://www.theregister.co.uk/2012/05/16/avira_update_snafu/

This "anti-virus" software thought it had found viruses in essential parts of Windows, that are actually signed by Microsoft. Someone commented "Either the bad guys cracked Microsoft's code signing; in that case we can just give up. Or they didn't, in that case the anti-virus software was wrong. In either case, the anti-virus software shouldn't touch anything that is code-signed by Microsoft".
Rating: 3 Votes
33 months ago

Yes, and we can all stay locked up indoors at home, as well.
If we take the risk to venture outside out homes then we could get shot, run over, trip over the kerb, who knows.....

Best just to do as we are told, never take any risks and stay safe all our lives, that way we will never be in any danger.


If you think staying at home is safe, you have another think coming:

http://www.nationmaster.com/graph/mor_fal_inv_bed-mortality-fall-involving-bed
Rating: 3 Votes

[ Read All Comments ]