I have a Trojan horse virus in my iPad 2 , my iPhone, and my desktop pc. My antivirus from my desktop got rid of it on my PC, how do I rid it from my IPad , and phone??

I know I am not supposed to get a virus on apple products , but here I am. How do I rid myself of it. ??? How did  I get it in the fist place? Does apple make virus protection???if so where and how do I get it?

So let me understand this.
Not only are you the first person to have discovered a virus for Mac OS X, but this is also a miracle type of virus that can also be cross-compatible not just from a desktop, but also across both the iPad and even iPhone too?  Ammazing.
Oh wait, better yet, this magical virus is even capable of working in both Microsoft windows environments, AND mac os X environments, AND iOS environments!
What an ammazing feat instead! That author of the virus deserves the nobel prize of the century award I would think!
However, I would first try to use a tiny bit of logic and reasoning before jumping to conclusions about magical viruses here. Just because something tells you a man has walked on water, doesn't mean it's really possible.

Similar Messages

  • TS1338 I have 4 Trojan Horse viruses on my external drive I use for Time Machine.  My MacBook Pro hard drive is clean.  I have eased the external drive 3 times using Disk Utility and it still has the 4 Trojan Horse viruses. How do I get rid of them. Wayne

    I have 4 Trojan Horse viruses on my external drive I use for Time Machine.  My MacBook Pro hard drive is clean.  I have eased the external drive 3 times using Disk Utility and it still has the 4 Trojan Horse viruses. How do I get rid of them. I am using 10.8.3  Wayne

    ksu62 wrote:
    The infection names are:  classload.jar-719ef6a5.zip
                                              classload.jar-5db452le31.zip
                                              ar3.jar-6ce3b2f-45l483f.zip
                                              classload.jar-lef99412-63bsd3fl.zip
    Those look alot like file names and not infection names. I don't find any reference to anything like that on Norton or VirusTotal. Since you said these were Trojans, I would expect to see "Trojan" as part of the infection name.
    ".jar" files are executable Java applets. The random alpha-numerics would seem to indicate a cache file, likely from a browser with Java enabled. And we all know what ".zip" means.
    Worst case is that you had Java enabled in a browser and were infected by one of the late variants of the Flashback Trojan over a year ago or one of a couple of other attacks using the same vulnerability but targetted against a small number of political sympathizers. Much more probable is that thes were Windows only Trojans. Hopefully you have a fully up-to-date OS X, including Java, and have disabled Java in all your browsers by now.

  • I have  at trojan horse.norton can not remove or quarrantine.virus is 36c09694-167c0775.Help

    I have a trojan horse virus.36c09694-167c0775 Norton can not remove or quarrantine.Help

    I don't think anyone here will be able to identify which trojan that is, or whether, even, it's a Mac trojan. I would contact them. Only they will know what that code is supposed to mean.
    BTW, there is no such animal as a trojan horse virus. There are trojans and viruses, two entirely different things. Thre are no viruses at all for Mac.

  • My NB505-N500BL with windows 7 got a Trojan Horse Virus..

    Hello all,
    OK.. I bought this NB505-N500BL, Serial # a couple years ago, it has Windows 7 Operation system.   I loaned it out to a friend who promptly got a Trojan Horse Virus then sent it back to me.  I cannot find the original CD that came with this computer and I didn't make a recovery disc for it when I bought it.. (silly me)..
    Question:   How do I fix this problem? IS it worth fixing?  can I do it by buying a recovery disc from Toshiba OR do I need to buy new hardware?     
    Thanks..   Frank

    mini notebook NB505-N500BL
    Your support page is here - http://support.toshiba.com/support/modelHome?freeText=2871355
    From your user guide located here - http://support.toshiba.com/support/staticContentDetail?contentId=2865070&isFromTOCLink=false
    Before you start recovery plug in power supply for the entire process:
    You can recover the original factory image (returning the computer
    to its out-of-box state) using the utilities stored on your computer’s
    internal storage drive or using recovery DVDs/media, if you have
    created such media. To recover using the first method, follow the
    procedure below. To recover using the second method, see
    “Restoring from recovery DVDs/media” on page 60.
    To recover the original factory image using the utilities on your
    computer’s internal storage drive:
    1 Make sure the computer is turned off.
    2 Press and hold the 0 (zero) key on your keyboard while
    powering on the computer.
    Getting Started 51
    Recovering the Internal Storage Drive
    3 If your system offers a choice of Windows® 7 32-bit or 64-bit
    operating system, select one at this time. If not, skip to step 4.
    4 A warning screen appears, stating that when the recovery is
    executed all data will be deleted and rewritten. Click Yes to
    continue.
    (Sample Image) Warning screen
    5 When the Toshiba Recovery Wizard opens and the Selecting a
    process screen displays, select Recovery of Factory Default
    Software and then click Next.
    (Sample Image) Selecting a Process screen
    52 Getting Started
    Recovering the Internal Storage Drive
    6 The Recovery of Factory Default Software screen appears.
    Select Recover to out-of-box state.
    (Sample Image) Recovery of Factory Default Software screen
    7 Click Next.
    A confirmation message displays reminding you that all data
    will be lost during the recovery process. Be sure to save your
    work to external media before proceeding (see “Backing up
    your work” on page 93).
    8 Click Next to begin the recovery.
    When the process is complete, a message displays indicating
    that the internal storage drive has been recovered.
    9 Press any key on the keyboard to restart the computer.
    S70-ABT2N22 Windows 7 Pro & 8.1Pro, C55-A5180 Windows 8.1****Click on White “Kudos” STAR to say thanks!****

  • New Trojan Horse Virus

    First, I am aware that the Mac has never had a virus and is not readily suceptible to them due to the quantity of Macs in service and the complexity of the Unix format. However, I also realize that the word "never" is relative and no one knows what the future holds.
    In light of the "apparent" new Trojan Horse Virus that has just surfaced, could someone answer the following questions for information only.
    There is a question as to whether this is a Trojan Horse or a Virus. Has that been cleared up?
    I have followed the discussions concerning the various virus programs for the Mac. There seems to be problems with all of them such that many are saying the problems do not justify installing these, in light of the low probability of a virus or trojan horse. There is also the question that is raised as to why some of these programs work great for some and poorly for others. One of these programs seem to surface more than others. It is CLAMX AV.
    My questions concerning CLAMX AV is:
    Does this program simply identify a virus or can it be configured to quarantine, or delete the virus completely?
    If it will delete the virus, can this be done automatically in the background or is there some interaction that has to be done on the part of the user?
    What primary issues concerning my Mac must be considered before installing the program?
    Thanks
    Herschel

    There is a good guide to Leap-A at http://www.macworld.com/news/2006/02/16/leapafaq/index.php
    If you want to see how easy or hard it is to catch have a look at http://www.macworld.com/news/2006/02/17/leapafollow/index.php
    Prerequisites (even before you get to the point where you have to help it along its way by actually deliberately opening the offending file) involve using iChat over a Bonjour (not just internet) network under OSX10.4 while connected to someone infected with it.
    THis is clearly not really going to be a significant issue in itself, though others may try to emulate its operations with "nastier" enhancements.
    (Just by the way, Macs have had viruses etc in the past under earlier OS's. The last one I actually saw was on a machine running OS7.5 in the mid 1990's. It had arrived on the victim's machine on a floppy disc containing pirated software from an educational institution. Prior to the mid 1990's I saw three other incidences of virus infection on Macs - all on machines used in the education sector)
    Cheers
    Rod

  • Trojan Horse Virus in Flashplayer Update

    This is the second time within a month that the update has contained Trojan Horse virus.  How do I tell Adobe directly that they have a problem because I go round in circles trying to find a contact form.  Very annoying!!!!

    THERE IS NO VIRUS IN FLASH PLAYER
    Get it?
    Adobe IS NOT in the business of distributing malware.
    It was a "false positive" from a bad definition in your antivirus.
    Whether you like that reality or not... whether you agree with it or not... you can't change it!

  • Trojan horse virus..can't remove

    Greetings,
    recently I downloaded a video reader from a website.....but since I've done this it's taken over all the google, yahoo, and ask paid links and instead launched a website that directs me away from the paid links.
    I've tried a few virus removers but they don't seem to remove the virus. Tried to clear all my cookies and cache..but it still comes back..need Help!
    Any ideas??
    best regards

    You downloaded a file claiming it was a video codec from a **** site, which is why you now have a Trojan Horse. To remove it, download and run this program: DNSChanger Removal Tool, then reboot your Mac and the problem should be gone.
    To avoid this problem in the future, don't visit **** sites, and definitely don't download things that are not from trusted sources, or at least legitimate sources. All legitimate video codecs come from real companies with real names and information about their codec.
    Mulder

  • I have a wireless network at home. I run my iphone and ipad on it with no problems. Just purchased a MacBook Pro, and now my wi-fi keeps disconnecting and i get an error message saying another device is using the same IP address. What does all this mean?

    I have a wireless network at home. I run my iphone and ipad on it with no problems. Just purchased a MacBook Pro, and now my wi-fi keeps disconnecting and i get an error message saying another device is using the same IP address. What does all this mean?

    Hello AKCamus
    To give you some ideas of what to do next, I have provided a few articles that will give some troubleshooting Wi-Fi connections and recommended Wi-Fi settings.
    iOS and OS X: Recommended settings for Wi-Fi routers and access points
    http://support.apple.com/kb/HT4199
    iOS: Troubleshooting Wi-Fi networks and connections
    http://support.apple.com/kb/ts1398
    Troubleshooting Wi-Fi issues in OS X Lion and Mac OS X v10.6
    http://support.apple.com/kb/HT4628
    Thanks for using Apple Support Communities.
    Regards,
    -Norm G.

  • Trojan Horse virus warning on my MAC

    I got a error message of Trojan Horse virus. the message has a number 800 404 5537 to help. They told me to enter an address on the internet explorer URL to control my computer to troubleshoot. Should I give them access? 

    This is a well-known fake tech support scam. If you call them, they will "show" you some things on your machine that they will tell you are indicative of viruses and other problems. (They are actually perfectly normal things that people can be easily frightened into misinterpreting.)
    If you go along with them, they will do two things: 1) require you to pay for a year or two of "service" by giving them a credit card, and 2) request remote access to your computer so they can fix it. They will then charge your credit card far more than they said they would and potentially use the remote access you grant them to install malicious software on your computer.
    Never fall for this kind of scam. If you do, there's only one possible response: cancel the credit card and erase the computer's hard drive.

  • HT5246 The above info is confuses me.  I thought this trojan horse affected those who had Java (JRE) up and running  i.e.,Safari security Java checkbox enabled.  I also believed this Trojan horse affected those using Snow Leopard. Clarify please.

    The above info re the Flashback removal tool confuses me.  I thought this trojan horse affected those who had Java (JRE) up and running  i.e.,Safari security Java checkbox enabled.  I also believed this Trojan horse also affected those using Snow Leopard. Clarify please.

    There are several variants of the trojan. The first ones were released as installers for Adobe Flash and therefore did not require you to have Java on your system. Later variants took advantage of a Java vulnerability and could install themselves by simply visiting a rogue Web site. Therefore, even without Java installed if you had run a rogue updater for Adobe Flash or Reader, then you might have installed the trojan.
    The trojan also affects Snow Leopard and prior versions of OS X (so far the code is known to be intel-only, but this is unconfirmed), but Apple has only issued patches for supported versions of the OS (version 10.6 or later).
    Apple's removal tools run in OS X 10.6 or later if you instlal the Java update, and the standalone removal tool is for Lion only. Why Apple does not offer options for other operating systems is beyond me, but that's the way of things. Right now there are other tools you can use to check for and remove the malware on versions of OS X that Apple does not support: http://reviews.cnet.com/8301-13727_7-57413811-263/flashback-malware-removal-tool -roundup/

  • Hi i have a question, I'm trying to back up  my iPhone to iTunes but it says restore from backup or setup up as new device. if i setup as new device will everything be deleted? if yes then how would i back it up without anything being deleted

    Hi i have a question, I'm trying to back up  my iPhone to iTunes but it says restore from backup or setup up as new device. if i setup as new device will everything be deleted? if yes then how would i back it up without anything being deleted

    Following is a link to instructions on how to backup (either via iTunes and via iCloud) http://support.apple.com/kb/HT1766

  • I think I have a trojan horse, what to do?

    First off, I'm going to start by admitting that this is my fault.
    Last month I was ***** and cruising around looking at internet **** on my brand new 21.5 iMac. I think I tried to view a video on one of the sites and was prompted to download a required plugin, which I did. I believe that's how the trojan was allowed onto my machine.
    There was one site I decided to join for $19.99/month (one month only) and I filled out the online form including my cc information. The next day or so I received a phone call from the people who monitor my cc. They said there had been some unusual activity on my account. After reviewing, I found that about $800 in charges were made to my card by someone else. The card was cancelled and now, a couple weeks later, I have a brand new card.
    Fast forward a couple weeks to this last Sunday. I decided to buy some new floor mats for my wifes car ($117)and went online with the same computer to a web site for a well known company and this time I used my Paypal account to purchase the floor mats. The next morning I got an email from Paypal telling me that I had sent $20 to a company called Garena Online Private Limited. I contacted Paypal and started the process to dispute the charge and also changed my password.
    So, that's the background but now what should I do to get rid of the trojan horse? Is there some kind of virus protection software I need to run? I've been a Mac user since 1992 and this is the first time this has happened. TIA.

    http://discussions.apple.com/thread.jspa?threadID=1764179&tstart=0
    Tho seemingly from 2008 and archived, some info is old, but some was updated Oct 2010. Also use openDNS per http://discussions.apple.com/thread.jspa?messageID=13268959
    Wipe out the hard drive and Reinstall everything from scratch. If you don't have an external drive, you could use the Partition tab in Disk Utilty to shrink existing volume, and create a new empty 2nd volume. I would not use any backup software first (as it might include the trojan), but just manually copy your files by drag and drop in the Finder.
    For good overview of how to prevent it in future...
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174

  • Trojan Horse Virus

    A little while ago, my macbook was very slow and I went into the Apple store and they recommended that I turn Norton Antivirus off. I did.
    A few months later (now) I ran it just for the heck of it to see if it found anything - and it did. Two or three Trojan Horse malware files. Looking at Nortons descriptions, I think that they were (I located and deleted them) all PC based virus BUT, I am wondering:
    1. I have Microsoft Office for Mac on my Macbook and I am wondering if those files might have been compromised by a PC virus?
    2. I am assuming that if these files have been compromised there is nothing that I can do about retrieving that information as it could be anywhere.
    3. If I have other PC based drives hooked up to my macbook wirelessly - were they vulnerable while I had these Trojan Horses on my Macbook?
    Thanks.
    A.

    Don't always believe what Norton tells you. It is incompatible with OS X.
    Norton Antivirus has a very long and illustrious reputation for mangling Mac OS X systems, sometimes to the point where a complete reinstall is necessary. Among other things, it installs kernel extensions which are known to cause kernel panics and system freezes; it contains known and documented bugs which can silently corrupt Adobe Photoshop and Adobe InDesign files, destroy a user's ability to authenticate as an administrator, and (on PPC systems) can cause Classic to stop functioning; and Symantec has on at least two occasions now released flawed .dat file updates which erroneously report certain critical Mac OS X files as "viruses." (Deleting these "viruses" causes damage to the system that in some cases renders it unbootable.)
    1. No
    2. Need more details about what you call 'compromised'
    3. Yes.
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from (on no account install Norton Anti-Virus on a Mac running OS X):
    http://www.clamxav.com/
    The new version for Snow Leopard is available here:
    http://www.clamxav.com/index.php?page=v2beta
    (Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.)
    If you are already using ClamXav: please ensure that you have installed Apple Security Update 2010-005 and that your version of ClamXav is the latest available.
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites like Twitter etc), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    As to the recent 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program. A recent example is of malware distributed through innocent looking free screensavers: http://www.zdnet.com/blog/security/malware-watch-free-mac-os-x-screensavers-bund led-with-spyware/6560?tag=nl.e589
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications and download torrents) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    Also, there is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    NOTE: Snow Leopard, OS 10.6.x, offers additional security to that of previous versions of OS X, but not to the extent that you should ignore the foregoing:
    http://www.apple.com/macosx/security/
    Apple's 10.6.4 operating system upgrade silently updated the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    Finally, do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/

  • What about trojan horse virus?

    The news today discussed a new trojan horse stealing passwords, etc.  Is there any fix or software to prevent damage or loss of data?

    If you're running an iMac G5, that's a PPC Mac (you're in the wrong forum, BTW) I don't think you have much to worry about. As far as I know, and I could be wrong, the Flashback Trojan, at least right now, is not interested in PPC Macs. It appears to be written to attack Intel Macs only. In any case, since this could change, disable Java in the browser you use, to be safe.

  • TS4147 Me and my wife have same ICloud account she made back up for her iPhone and I lost my contacts how to restore  my contacts?

    How to restore my contacts

    Sorry no backup - no pictures.
    Yes phone will automatically backup to icloud when on wifi and phone is charge, but your phone storage was full so it stop backing up.
    Back up and restore your iPhone, iPad, or iPod touch using iCloud or iTunes - Apple Support
    iCloud: iCloud storage and backup overview
    When your phone was connected to your computer, you should've seen an autoplay which would've allowed you to import your pics to your computer as you would a digital camera Import photos and videos from your iPhone, iPad, or iPod touch to your Mac or Windows PC - Apple Support

Maybe you are looking for