The Trojan Flashback, released in September 2011, he returned to the fray with a new variant of this year, according to a report by the Russian firm Dr. Web, now has over half a million Macs in the world infected. According to the company, even has 274 registered bots in Cupertino, where is located the Apple mothership.

According to Dr. Web, 57% of infected Macs are in the U.S. and 20% in Canada. At Latin America, Mexico and Brazil have a rate of 0.3%, while in Chile and Argentina with 0.1% only.The malware was discovered in September 2011 when he posed as an installation of Adobe Flash Player. But in recent months has evolved into new variants called FLashback.I Flashback.K and to take advantage of weaknesses in Java that are (or were) without patching on OS X. Oracle released a fix for the problem in February this year, but Apple only started shipping the patch to users this week after it became known the problem of Flashback. The patches that eliminate the problem is Java for Mac OS X 10.6 and Java for OS X Lion 2012-001. F-Secure has instructions to detect and remove (in English).

Flashback is installed without user intervention, all that is required is to visit a compromised or malicious site and ready, the Trojan will download and install.

Once installed, Flashback performs a code injection in web browsers and other applications like Skype to collect passwords and user information while using these programs.
The malware works in two ways. In one, ask for an administrator password, and if given, malware attached to Firefox and Safari and cast to walk when you open any of the two browsers. If you do not get the password, will be installed on the user's application folder, where you can start walking when any application is started, however, is more detectable when in this position.