Can the world really rely on this UUID # check?
  1. What's the liklihood that any one particular infected Mac is included in the database?
  2. Is there any estimate of how many Macs were infected in the earliest days of the trojan's life, prior to its being discovered, reverse-engineered, and having its activity logged, however long that period of time was?
  3. In the face of Terminal commands, and GUIs therefore, that actually detect the presence of the trojan, what's the point of even wasting your time with such a contraption?
And this... I don't remember in which of the many articles I've looked at this was reported, but I did read that the first thing the trojan does is scan a Mac for particular apps, Little Snitch likely being the the most widely distributed one, and passes by machines that are running any of them.

I don't recall that being mentioned in this thread, and I'm wondering whether it's factual?

Last edited by artie505; 04/10/12 10:15 PM. Reason: Cleanup

The new Great Equalizer is the SEND button.

In Memory of Harv: Those who can make you believe absurdities can make you commit atrocities. ~Voltaire