The lab’s Flashfake Removal Tool was suspended after Kaspersky discovered that it was erroneously removing user settings—including auto-start configurations, user configurations in browsers, and file sharing data—from infected computers. It had been in operation since Monday.
“The Kaspersky Flashfake Removal Tool has been temporarily suspended,” spokesman Greg Sabey said in an email to reporters. “The company will release an updated version of the utility with the bug corrected and will send a notification as soon as it’s available.”
Kaspersky’s suspension comes during a busy week in the Flashback-fighting front. Apple on Tuesday said it was developing a technical solution to the defeat the malware, and added that it was working with service providers to to disable Flashback’s “command and control network.”
The malware has reportedly affected more than 600,000 Macs.
Other options remain available. For example, Apple issued a patch last week to close the Java vulnerability that Flashback exploits, though that update won’t detect whether you’re infected or remove the malware. Last week, F-Secure published a set of Terminal commands to uncover the exploit, and on Monday an independent programmer released a Mac app that can check for the infection as well.
Kaspersky, meanwhile, asked users who had experienced problems with its Flashflake Removal Tool to email the company, or call its Moscow home office at 7 (495) 797-70-32. It is there to provide support or answer questions.