Mac Attack: Java Exploit Used In Apple Inc. Breach

Apple Inc. is the latest company to become a victim of cyber attackers, the company disclosed on Tuesday, Feb. 19. The computers of several Apple employees were compromised by a group of unknown hackers.

Reports say that the hackers manipulated the Mac computers using the same exploit of Oracle Corp's Java plug-in software. The same Java exploit was used to launch recents attacks on Facebook which was announced Friday, Feb. 15.

Cyber attackers have switched their attention from the Windows operating system and are now targeting Mac OS X software-based computers. The malware was designed to specifically to attack Mac computers and occurred when the Apple workers navigated to a site for software developers. The site was infected with malicious software, allowing the computers' systems to become infected in turn.

As reported by Reuters, the attack is significant, as it's the highest-profile attack on a business that run on Mac computers. The malware was also employed in attacks against Mac computers used by "other companies," said Apple to Reuters.

"Apple has identified malware which infected a limited number of Mac systems through a vulnerability in the Java plug-in for browsers. The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers," said an Apple spokesman in a statement.

An individual who did not wish to be identified revealed to Reuters, "This is the first really big attack on Macs. Apple has more on its hands than the attack on itself." Apple is working with law enforcement officials in an effort to identify the hackers.

Apple software security expert Charlie Miller said the recent attacks are an indication that hackers are taking the time to understand the Mac OS X operating system. He explained that using an exploit found in Adobe System Inc.'s Flash Software, cybercriminals figured out a highly advanced way to hack Mac systems.

Apple said it will assist customers with their computers should they fall victim to the same vulnerability attack with the release of software that will identify and repair their Macs. 

© 2024 iTech Post All rights reserved. Do not reproduce without permission.

Company from iTechPost

More from iTechPost