{"id":100572,"date":"2024-05-16T13:16:22","date_gmt":"2024-05-16T20:16:22","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100572"},"modified":"2024-08-08T19:05:28","modified_gmt":"2024-08-09T02:05:28","slug":"intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/","title":{"rendered":"Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"wp-image-100610 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-600x350-1.jpg\" alt=\"\" width=\"600\" height=\"350\" \/><\/p>\n<p>In recent months, we&#8217;ve written a lot about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer malware that infects Macs<\/a>. One malware family that frequently resurfaces is <strong>Atomic Stealer<\/strong>, or <strong>AMOS<\/strong> (short for Atomic macOS Stealer). AMOS is designed to exfiltrate sensitive data from infected Macs; this typically includes things like saved passwords, cookies, autofill text, and cryptocurrency wallets. Recent headlines have used the malware or campaign name &#8220;<strong>Cuckoo<\/strong>&#8221;\u00a0to describe some variants of the AMOS family.<\/p>\n<p>Cuckoo malware, like other AMOS variants, is distributed in the form of Trojan horses, often masquerading as supposedly pirated or &#8220;cracked&#8221; versions of apps. In recent months, numerous Trojan horses have pretend to be various legitimate apps; they employ elaborate campaigns, leveraging malicious Google Ads that link to lookalike homepages with Trojan downloads.<\/p>\n<p><strong>Yesterday, Intego began tracking new Cuckoo variants that have not been written about elsewhere.<\/strong> Here&#8217;s everything you need to know about Cuckoo, and how to stay protected.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#mimicry\">A brief history of Cuckoo Mac malware<\/a><\/li>\n<li><a href=\"#newcuckoo\">Intego discovers a new Cuckoo variant<\/a><\/li>\n<li><a href=\"#source\">Source of these new Cuckoo infections<\/a><\/li>\n<li><a href=\"#staysafe\">How can I keep my Mac safe from Cuckoo and other malware?<\/a><\/li>\n<li><a href=\"#iocs\">Indicators of compromise (IOCs)<\/a><\/li>\n<li><a href=\"#other-names\">Do security vendors detect this by any other names?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"mimicry\"><\/a><\/li>\n<\/ul>\n<h3>A brief history of Cuckoo Mac malware<\/h3>\n<p>Atomic macOS Stealer (AMOS, or AtomicStealer) <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\">first surfaced<\/a> in late April 2023, just over a year ago. At the time, a threat actor began selling it via Telegram as <strong>malware as a service<\/strong>, licensable for $1,000 per month.<\/p>\n<p>Since then, we&#8217;ve seen lots of AMOS variants emerge. We wrote about later campaigns in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-data-stealer-malware-roundup-atomicstealer-metastealer-realst-all-active-in-september\/\">September 2023<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">February 2024<\/a>, and we often discuss it on the <a href=\"https:\/\/podcast.intego.com\">Intego Mac Podcast<\/a>.<\/p>\n<p>Earlier this month, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/\">we wrote about <strong>a previously undocumented AMOS variant<\/strong><\/a><strong> that Intego&#8217;s research team discovered<\/strong>.<\/p>\n<p>Most often, AMOS malware is distributed through malicious Google Ads campaigns. These poisoned Google ads appear at the top of search results, where many people will see and click on them. In some cases, the ads are virtually indistinguishable from legitimate Google Ads run by the real software companies they mimic.<\/p>\n<p>Beginning a few weeks ago, in late April, a few antivirus vendors began calling some AMOS variants by the name Cuckoo.<\/p>\n<h4><strong>A new Cuckoo variant emerges<\/strong><\/h4>\n<p>Just yesterday, on the morning of Wednesday, May 15, a researcher named Alden wrote on <a href=\"https:\/\/twitter.com\/birchb0y\/status\/1790746238758817821\" target=\"_blank\" rel=\"noopener\">social media<\/a> about a <a href=\"https:\/\/alden.io\/posts\/infostealers-a-brewin\/\">blog post<\/a> he had just published. Alden described this new campaign as distributing &#8220;Cuckoo and AtomicStealer.&#8221;<\/p>\n<p>In his blog post, Alden wrote that someone had <a href=\"https:\/\/www.virustotal.com\/gui\/file\/ce6dc065752cb46437ce6a200e29d5dbd96473daa72dcce07aa493b821a99ba9\">submitted a file to VirusTotal<\/a> that contacted a suspicious domain that mimics the homepage of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/homebrew\/\">Homebrew<\/a>, a popular macOS software package manager. The page tries to trick users into copying and pasting a command from the site into their Mac&#8217;s Terminal app.<\/p>\n<p>While that might sound ridiculously suspicious and dangerous\u2014and it normally would be\u2014the legitimate Homebrew software is actually installed in this exact way. <strong>The lookalike page was so convincing that Alden himself, a professional malware researcher, said he would have fallen for it.<\/strong><\/p>\n<div id=\"attachment_100578\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-100578\" loading=\"lazy\" class=\"wp-image-100578 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/Homebrew-homepage-fake-AMOS-Cuckoo-malware-campaign.jpg\" alt=\"A fake Homebrew homepage, part of an AMOS\/Cuckoo Mac malware campaign.\" width=\"600\" height=\"479\" \/><p id=\"caption-attachment-100578\" class=\"wp-caption-text\">A fake Homebrew site, part of an AMOS\/Cuckoo Mac malware campaign.<\/p><\/div>\n<p>Compare for yourself. Would you have guessed correctly which is real, and which is fake?<\/p>\n<div id=\"attachment_100579\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-100579\" loading=\"lazy\" class=\"wp-image-100579 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/Homebrew-homepage-real.jpg\" alt=\"The real Homebrew site. Ironically, it has a longer, more suspicious-looking install URL.\" width=\"600\" height=\"479\" \/><p id=\"caption-attachment-100579\" class=\"wp-caption-text\">The real Homebrew site. Ironically, it has a longer, more suspicious-looking install URL.<\/p><\/div>\n<p>Interestingly, this is not the first time that malware makers have mimicked Homebrew. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\">In 2020, threat actors used another domain<\/a> that was similar to that of the real Homebrew site, as part of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/typosquatting\/\">typosquatting<\/a> campaign. Additionally, back <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/\">in 2017, Mac malware known as Dok<\/a> used &#8220;homebrew&#8221; in the filename of one of its LaunchAgents.<a name=\"newcuckoo\"><\/a><\/p>\n<h3>Intego discovers new Cuckoo variants<\/h3>\n<p>While conducting our own research based on Alden&#8217;s findings, <strong>Intego discovered that the shell script dropper and the initial Mach-O binary had both changed already<\/strong> from what were originally hosted on the lookalike site, merely hours after Alden&#8217;s social media post went live.<\/p>\n<p>The new version of the bash script (the <code>install.sh<\/code> file) only had a minor, insignificant change, possibly to evade rudimentary antivirus protection based on whole-file hashes. The SHA-256 hash for the new variant is <code>1ea41635116b43afd1e50ed9dec1534699fb1958bd777971dd0fb7bc0ed104ec<\/code>.<\/p>\n<p>But where things get interesting is the Mach-O binary (the <code>brewinstaller<\/code> file) distributed through the site.<\/p>\n<p>Of course, it still has the usual infostealer functionality: gathering wallets, passwords, and other sensitive data, and exfiltrating them to the malware maker. But what&#8217;s new in the updated sample we discovered is that it <strong>adds additional functionality to behave differently if it&#8217;s run within a virtual machine<\/strong>. In particular, it checks whether it&#8217;s running within a VirtualBox, VMware, or Parallels virtual environment. Most of the time, when an app contains VM detection, it&#8217;s to make the app more difficult for reverse engineers or malware analysts to investigate.<\/p>\n<p>One can imagine that perhaps the malware maker might have seen Alden&#8217;s blog post, and added the anti-VM capability to make it a little more difficult for malware analysts to pick apart.<\/p>\n<p>This new Cuckoo Mach-O variant that checks whether it&#8217;s running within a VM has the SHA-256 hash <code>513bb09807c9c343fccf7df30f687ea490125745e5ae02177c92efeb514e4b30<\/code>.<\/p>\n<p><strong>Intego also found several additional new Cuckoo samples<\/strong> through our own threat hunting efforts; see the full list of new hashes in the <a href=\"#iocs\">IOCs section<\/a> below.<a name=\"source\"><\/a><\/p>\n<h3>Source of these new Cuckoo infections<\/h3>\n<p>Although we haven&#8217;t yet definitively confirmed this, it&#8217;s likely that the team behind this campaign is up to its usual tricks, including <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">Google Ads poisoning<\/a>. Threat actors often pay Google for top placement, with sponsored ads disguised as real ads for legitimate software. These ads appear immediately above the actual search results; if you aren&#8217;t careful, you could inadvertently visit a malware distribution site instead of landing on the real software developer&#8217;s site.<\/p>\n<p><strong>We recommend that everyone get out of the habit of &#8220;just Google it&#8221; to find legitimate sites.<\/strong> Such habits often include clicking on the first link without giving it much thought, under the assumption that Google won&#8217;t lead them astray, and will give them the correct result right at the top. Malware makers know this, of course, and that&#8217;s why they&#8217;re paying Google for the number-one position.<\/p>\n<p>Until or unless Google does a much better job of vetting its ads, a better practice than &#8220;Google it&#8221; would be to <strong>bookmark trusted sites whenever possible<\/strong>, and to go back to those bookmarks in the future.<a name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from Cuckoo and other malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects these samples as <strong>OSX\/Amos.ext<\/strong>, <strong>OSX\/Amos.gen<\/strong>,\u00a0<strong>OSX\/PSW.ext<\/strong>, <strong>virus\/OSX\/AVA.Agent.qtqz<\/strong>, <strong>virus\/OSX\/AVI.Agent.emto<\/strong>, and similar names.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. To get started, just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>As is typical, some of these samples initially had a very low detection rate on the multi-engine single file scanning site VirusTotal. For the two shell script variants, 0 out of 60+ antivirus engines appeared to detect them. Several other files had fewer than 10 positive detections when first uploaded to VirusTotal.<\/p>\n<p>Following are SHA-256 hashes of malware samples from Homebrew-related and other Cuckoo\/AMOS malware campaigns:<\/p>\n<pre>2d96a92180403717f2f69d23c53398b597e2db15f683c04f41e34d048b1b0b16*\r\n42b4b1c13d6bd206e8ad1630d5d61aff6d949326ff6800593695c91e65fc861a*\r\n513bb09807c9c343fccf7df30f687ea490125745e5ae02177c92efeb514e4b30*\r\n554354c8a0d089b99b1a47cbf71a0bc19c5fc9e4e8b27c74367d86a7a1940004*\r\n683c69923e13c46919a691f553b2b7473a725d836c34e2b05a84bde1f1374f1c*\r\n95a7734d5f853146f31bb2aafe043a3639f742d97ef8ba72070273493851e5a8*\r\na76597803298ee9475f2ebffc9352ed983d3a05081f58dcf9f52111268be9cf9*\r\ncc3ff7f75f46bab9acb37b042ea02bdc55b759ff82778f019f51801c9df1d288*\r\n1ea41635116b43afd1e50ed9dec1534699fb1958bd777971dd0fb7bc0ed104ec*\r\ne2848c89bd8976d8a22e8d76ddd06ea7a434e0adbbd8d4d422680424005df640*\r\n0d3a9cb3d86aa94adcee79fc5511c2d86aa3c37cb142b00761d8cf9541062ccd**\r\n1dfc5689913347d052a24488256758ce87ba7acff412fb293993552b38640b3e**\r\n31eeefa264147131576371d87d75d948b4b4829fef713554486ef7e39fb0e8d4**\r\n40b2b2fc795ad7d6105b68813a6a3c246f6dd9eb8e21176e63f01ba9d4c56efb**\r\n5bdc9a651e2e8a6958a01f7a91d5318bd253a3ca310f2136cfb0dc45bbb83c6a**\r\n6662576e48a44418beee861499346b037c23ec0a91fb05c2d9ae3dc42650ab82**\r\n6e083739d0a443da1467219d7ace15d9b3488aad18b9f03870158b2d1c3b841f**\r\n77b3c5090800665c70f90a0d1ce7e0469021a0c599c32e62d1c1059bc8451b6c**\r\naef437e9030fbb4d61894e4113dc3615400dcc0259612f4131369bc8585cde64**\r\n41ac6a7dd1f78d946d7321a2ec8c753a3db647d95d39474f80dc316ecfb803c2**\r\nce6dc065752cb46437ce6a200e29d5dbd96473daa72dcce07aa493b821a99ba9\r\nf608301ebb09ecdc9840c84f758f5e60cb6f7ab4d34d2f2d468af624eb800e50\r\n574a0a47811b06228271c48dab1e3da889c643b90515b36bcdbdc8a48385785e\r\n2958dfe9251c6bf997ceb94f2eea1b808a8e53bd5e79b7152f79379f441ede83\r\n1827db474aa94870aafdd63bdc25d61799c2f405ef94e88432e8e212dfa51ac7\r\n39f1224d7d71100f86651012c87c181a545b0a1606edc49131730f8c5b56bdb7\r\na709dacc4d741926a7f04cad40a22adfc12dd7406f016dd668dd98725686a2dc\r\nd8c3c7eedd41b35a9a30a99727b9e0b47e652b8f601b58e2c20e2a7d30ce14a8\r\n254663d6f4968b220795e0742284f9a846f995ba66590d97562e8f19049ffd4b\r\n* first reported by Intego\r\n**first reported by Intego; added on May 17<\/pre>\n<p>The following domains and IP addresses have evidently been used in connection with these Cuckoo\/AMOS samples and similar recent campaigns:<\/p>\n<pre>homebrew[.]cx\r\nhomebrew[.]page\r\nhomebrewl[.]pro\r\nhornebrew[.]mom\r\naroqui[.]com\r\ncoinpepe[.]xyz\r\ndumpmedia[.]com\r\nfonedog[.]com\r\nrectanglemac[.]pro\r\ntrello[.]bio\r\ntunefab[.]com\r\ntunesfun[.]com\r\ntunesolo[.]com\r\nwillowsushi[.]com\r\n5.42.100[.]86\r\n5.255.107[.]149\r\n77.221.151[.]41\r\n79.137.192[.]4\r\n85.217.222[.]185\r\n109.120.178[.]3\r\n146.70.80[.]123<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers may have attempted to contact one of these domains or IPs in recent weeks, which could indicate a possible infection.<a name=\"other-names\"><\/a><\/p>\n<h3>Do security vendors detect this by any other names?<\/h3>\n<p>Other antivirus vendors&#8217; names for this malware may include variations of the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of OSX\/PSW.Agent.AN, A Variant Of OSX\/PSW.Agent.BI, EmailWorm ( 0040f4c31 ), Gen:Variant.Trojan.MAC.Stealer.29 (B), HEUR:Trojan-PSW.OSX.Amos.gen, HEUR:Trojan-PSW.OSX.Amos.s, HEUR:Trojan-PSW.OSX.Amos.u, InfoStealer\/OSX.Agent.160526166, InfoStealer\/OSX.Agent.174240, InfoStealer\/OSX.Agent.370704, IOS\/Agent.AQ, IOS\/Agent5.CW, MAC.S.Agent.160526166, MAC\/Agent.BI!tr, MAC\/Stealer.20!tr, MacOS:Agent-AJQ [Trj], MacOS:Agent-AJR [Trj], MacOS:Agent-ALY [Trj], MacOS\/Agent.AQ, MacOS\/Agent5.CW, Malware.OSX\/AVA.Agent.gours, Malware.OSX\/AVA.Agent.qtqzz, Malware.OSX\/AVI.Agent.emtoe, Malware.OSX\/GM.Agent.LC, Malware.OSX\/GM.Agent.RX, Osx.Trojan-QQPass.QQRob.Fkjl, OSX.Trojan.Agent.K8KYBW, OSX.Trojan.Agent.V7M1LN, OSX.Trojan.Agent.Y7B81N, OSX.Trojan.Gen.2, OSX\/Agent.BI!tr.pws, OSX\/Generic.e, OSX\/GM.Agent.LC, OSX\/GM.Agent.RX, OSX\/PSW.Agent.BI, OSX\/PWS-CNU, OSX\/PWS-CNV, PossibleThreat, RiskWare:MacOS\/Agent.AT, RiskWare:MacOS\/Amos.J9OKG, TROJ_FRS.0NA104E724, Trojan:MacOS\/Amos.I!MTB, Trojan:MacOS\/Cuckoo!MTB, Trojan:MacOS\/Multiverze, Trojan.Generic.35766692 (B), Trojan.GenericKD.72696158 (B), Trojan.MAC.Generic.118846 (B), Trojan.OSX.Amos.i!c, Trojan.OSX.Cuckoo, Trojan.OSX.Generic.4!c, Trojan.OSX.Psw, Trojan.OSX.Stealer, Trojan.Trojan.MAC.Stealer.29, Trojan[PSW]\/MacOS.Amos, Trojan[stealer]:MacOS\/Amos.gyf, Trojan[stealer]:MacOS\/Amos.J9OKG, Trojan[stealer]:MacOS\/Amos.s, Trojan[stealer]:MacOS\/Amos.u, UDS:Trojan-PSW.OSX.Amos.s, Unix.Malware.Macos-10028017-0, Unix.Malware.Macos-10028612-0, Unix.Malware.Macos-10028816-0, Win32.Troj.Undef.a<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>You can read Alden&#8217;s <a href=\"https:\/\/twitter.com\/birchb0y\/status\/1790746238758817821\" target=\"_blank\" rel=\"noopener\">X social media thread<\/a> and <a href=\"https:\/\/alden.io\/posts\/infostealers-a-brewin\/\" target=\"_blank\" rel=\"noopener\">personal blog post<\/a> for more about the original variant of the Homebrew-lookalike Trojan horse. For more about the first AMOS malware variant that was identified as Cuckoo, you can read the <a href=\"https:\/\/blog.kandji.io\/malware-cuckoo-infostealer-spyware\" target=\"_blank\" rel=\"noopener nofollow\">writeup<\/a> by Adam Kohler and Christopher Lopez.<\/p>\n<p>Be sure to also check out our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-mac-and-iphone-malware-of-2023-and-what-to-expect-in-2024\/#forecast\">2024 Apple malware forecast<\/a> and our previous <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">Mac malware articles<\/a> from 2024 and earlier.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.<\/p>\n","protected":false},"author":14,"featured_media":100608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4737,4738,4615,86,4722],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego discovers new &quot;Cuckoo&quot; Mac malware mimicking Homebrew - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T20:16:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T02:05:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"OSX\/Cuckoo Mac stealer malware for macOS AMOS AtomicStealer variant\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\",\"name\":\"Intego discovers new \\\"Cuckoo\\\" Mac malware mimicking Homebrew - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#primaryimage\"},\"datePublished\":\"2024-05-16T20:16:22+00:00\",\"dateModified\":\"2024-08-09T02:05:28+00:00\",\"description\":\"Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew\",\"datePublished\":\"2024-05-16T20:16:22+00:00\",\"dateModified\":\"2024-08-09T02:05:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#webpage\"},\"wordCount\":1803,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg\",\"keywords\":[\"Atomic Stealer\",\"Homebrew\",\"Malvertising\",\"Malware\",\"Stealer Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/","og_locale":"en_US","og_type":"article","og_title":"Intego discovers new \"Cuckoo\" Mac malware mimicking Homebrew - The Mac Security Blog","og_description":"Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-05-16T20:16:22+00:00","article_modified_time":"2024-08-09T02:05:28+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg","width":400,"height":260,"caption":"OSX\/Cuckoo Mac stealer malware for macOS AMOS AtomicStealer variant"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/","name":"Intego discovers new \"Cuckoo\" Mac malware mimicking Homebrew - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#primaryimage"},"datePublished":"2024-05-16T20:16:22+00:00","dateModified":"2024-08-09T02:05:28+00:00","description":"Mac malware known as Cuckoo has begun to disguise itself as Homebrew, a command-line installed Mac utility. Intego has discovered several new variants of the malware, which is also known as Atomic Stealer or AMOS.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew","datePublished":"2024-05-16T20:16:22+00:00","dateModified":"2024-08-09T02:05:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#webpage"},"wordCount":1803,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg","keywords":["Atomic Stealer","Homebrew","Malvertising","Malware","Stealer Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/OSX-Cuckoo-Mac-macOS-malware-logo-v3-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qa8","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100572"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100572"}],"version-history":[{"count":34,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100572\/revisions"}],"predecessor-version":[{"id":100607,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100572\/revisions\/100607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100608"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}