The source of the Apple Mac Flashback Trojan was probably a large clutch of compromised US-based WordPress blog websites hijacked to push visitors to malware hosts, Kaspersky Lab research has revealed.

As has previously been established by various sources, between September 2011 and February of this year, the malware was distributed using social engineering attacks that asked users to download a bogus Adobe Flash Player plugin.

By late February this strategy changed thanks to a new partner program which distributed the malware as a drive-by attack hitting three common Java vulnerabilities via compromised websites.

Read more about the Mac Flashback Trojan.