	{"id":101082,"date":"2024-07-11T09:25:05","date_gmt":"2024-07-11T16:25:05","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=101082"},"modified":"2024-08-28T19:18:09","modified_gmt":"2024-08-29T02:18:09","slug":"poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/","title":{"rendered":"Poseidon macOS malware employs new tricks, targets Swiss Mac users"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-101087\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-600x350-1.jpg\" alt=\"\" width=\"600\" height=\"350\" \/><\/p>\n<p><em>Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens.<\/em><\/p>\n<p>Regular readers of The Mac Security Blog know that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer malware<\/a> is all the rage these days. Stealers are a class of malware; they attempt to find and exfiltrate sensitive data from an infected computer.<\/p>\n<p>The maker of a popular stealer malware family has recently rebranded as <strong>Poseidon<\/strong>. Under the hood, Poseidon looks and behaves much like existing AMOS malware. But what&#8217;s more interesting is that it is being used in malspam attacks against Swiss citizens.<\/p>\n<p>Here&#8217;s what you need to know to avoid the latest macOS malware threat.<\/p>\n<h3>A brief history of Poseidon Mac malware<\/h3>\n<p>Atomic macOS Stealer (AMOS, or AtomicStealer) <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\">first surfaced<\/a> in late April 2023, just over a year ago. At the time, a threat actor began selling it via Telegram as <strong>malware as a service<\/strong>, licensable for $1,000 per month.<\/p>\n<p>Since then, we&#8217;ve seen lots of AMOS variants emerge. We wrote about later campaigns in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-data-stealer-malware-roundup-atomicstealer-metastealer-realst-all-active-in-september\/\">September 2023<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">February 2024<\/a>, and we often discuss it on the <a href=\"https:\/\/podcast.intego.com\">Intego Mac Podcast<\/a>.<\/p>\n<p>In May, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/\">we wrote about a previously undocumented AMOS variant<\/a> that Intego&#8217;s research team discovered. We also documented another variant, dubbed <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\">Cuckoo<\/a>\u2014one version of which our team unearthed as well.<\/p>\n<p>Most often, AMOS malware is distributed through malicious Google Ads campaigns. These poisoned Google ads appear at the top of search results, where many people will see and click on them. In some cases, the ads are virtually indistinguishable from legitimate Google Ads run by the real software companies they mimic.<\/p>\n<p>Poseidon is the latest variant or copycat of AMOS. A threat actor who goes by the name Rodrigo4 distributes it. (You can <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-stealer-malware-market-surges-with-banshee-and-new-threat-actors\/#:~:text=Notable%20AMOS%20copycats\" target=\"_blank\" rel=\"noopener\">read more about Rodrigo4 in our later report about Banshee Stealer<\/a>.)<\/p>\n<p>From a technical standpoint, there&#8217;s one trait that distinguishes Poseidon from previous AMOS variants. That&#8217;s its alleged VPN configuration stealing functionality. Rodrigo4 claims that Poseidon can access and steal Fortinet and OpenVPN credentials from infected Macs. So far, we have not yet observed functional implementations of this capability in Poseidon samples.<\/p>\n<h3>What Poseidon variants have been observed so far?<\/h3>\n<p>Last month, Intego discovered <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-malware-discovery-fake-arc-browser-with-unique-applescript-component\/\">the first macOS Trojan horse masquerading as the Arc browser<\/a>. Malware researchers have observed Poseidon variants that also pose as Arc.<\/p>\n<div id=\"attachment_100838\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-100838\" loading=\"lazy\" class=\"size-full wp-image-100838\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/06\/Arc-browser-dmg-disk-image-screenshot-800x400-1.jpg\" alt=\"\" width=\"800\" height=\"400\" \/><p id=\"caption-attachment-100838\" class=\"wp-caption-text\">An in-the-wild Poseidon variant is disguised as Arc, an AI-infused Web browser.<\/p><\/div>\n<p>Another Poseidon variant disguises itself as &#8220;AGOV Access.&#8221; It claims to be related to the Swiss government site agov.ch, which is a &#8220;public service login for Switzerland.&#8221;<\/p>\n<div id=\"attachment_101089\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-101089\" loading=\"lazy\" class=\"size-full wp-image-101089\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/AGOV-Access-Swiss-government-Poseidon-Trojan-horse-disk-image.jpg\" alt=\"\" width=\"350\" height=\"380\" \/><p id=\"caption-attachment-101089\" class=\"wp-caption-text\">Poseidon masquerades as a Swiss government app. Image credit: <a href=\"https:\/\/x.com\/arch1ehic0x\/status\/1806678546607227054\" target=\"_blank\" rel=\"noopener\">Archie<\/a><\/p><\/div>\n<p>The real AGOV site currently displays a warning about this malware:<\/p>\n<blockquote><p><strong>Beware of malware!<\/strong><br \/>\nCybercriminals are currently sending emails claiming to be from the Federal Administration and claiming, among other things, that the AGOV access app is available as a desktop application. If you click on the link in the mail, you are asked to install software. Please beware: this is malware that infects macOS systems. <strong>Delete the email immediately!<\/strong><\/p><\/blockquote>\n<p>Interestingly, the Swiss National Cyber Security Centre (NCSC) even published its own <a href=\"https:\/\/www.ncsc.admin.ch\/24-poseidon-en\" target=\"_blank\" rel=\"noopener\">write-up<\/a> and <a href=\"https:\/\/github.com\/govcert-ch\/CTI\/tree\/main\/20240627_macOS_PoseidonStealer\" target=\"_blank\" rel=\"noopener\">technical details<\/a> about this macOS malware and the associated malspam e-mail campaign.<a name=\"source\"><\/a><\/p>\n<h3>Don&#8217;t &#8220;just Google it&#8221;<\/h3>\n<p>The Arc variant has been seen in the wild as part of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">Google Ads poisoning<\/a> campaign. Threat actors often pay Google for top placement, with sponsored ads disguised as real ads for legitimate software. These ads appear immediately above the actual search results; if you aren&#8217;t careful, you could inadvertently visit a malware distribution site instead of landing on the real software developer&#8217;s site.<\/p>\n<p><strong>We recommend that everyone get out of the habit of &#8220;just Google it&#8221; to find legitimate sites.<\/strong> Such habits often include clicking on the first link without giving it much thought, under the assumption that Google won&#8217;t lead them astray, and will give them the correct result right at the top. Malware makers know this, of course, and that&#8217;s why they&#8217;re paying Google for the number-one position.<\/p>\n<p>Until or unless Google does a much better job of vetting its ads, a better practice than &#8220;Google it&#8221; would be to <strong>bookmark trusted sites whenever possible<\/strong>, and to go back to those bookmarks in the future.<\/p>\n<p>And of course, as always, avoid clicking on links in e-mails as well.<a name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from similar malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects these samples as <strong>OSX\/Amos<\/strong>,\u00a0<strong>OSX\/Amos.ext<\/strong>, <strong>OSX\/Amos.scpt, OSX\/Stealer.ext<\/strong>, and similar names.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. To get started, just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>Following are SHA-256 hashes of malware samples from the Arc-wannabe AMOS malware campaign (the DMG, Mach-O, and AppleScript), as well as the aforementioned later variant of the AppleScript:<\/p>\n<pre>9760043ad36a34d6548cafe1e89cb53f6af76a28d492da37517d7cb1912eb154\r\na4d4bbb201f59f89ba25b011f6b3b50abc63025505e6b25e9be588d4d9d3544d\r\n02dff37f35bf78407d2ac3407e9ae0d363aa0fafc21e0d4fbf6521e589fc4749\r\nf4e770a4ae2b6521d7cb1aa7cdef35dbc78e7a8b0441fa60b6699ee63349daf2\r\n3b9a16f85d648ff7c4d21a666e1b79c4e70025ffcb64e5168143faf7bbce4844\r\n152f7d2b4f428fbb3586b99995cc6ca27ed3e6c4066ec511e1e2ba072392e2e0\r\n00b60bb5d692a0e3637b296c4db52dbee017caa0828bc302fc3a3e6963f4f513\r\n8bd2b88eb6ca23122dce6e02d362d1a0ae886dcb97492907a5672c8dd0f56dd2\r\n7276c6c6bff30cc9ddd97f4cd3e33102017281ffa7e164819dddc0beb83bafcf\r\n85371dc259945e1b27f72cd7f1bcf23d4cacac2100e8990efbc80b7020fe7640\r\na95b406a64f3a270338ccd9f4096c023046bad09670da3add6ed9b7ea4198820\r\nc1693ee747e31541919f84dfa89e36ca5b74074044b181656d95d7f40af34a05\r\n46b65c4f8179a6bf8bd32a5647009170b7a1256c674c680b78640c7e4fddec13\r\n748a7efffe738497c188b44c09335da7f93683a7bf0bc2dacc0f08783b03ce8b\r\n15b0d9e4f1258f647a9178a697edcb4526be442a8af5eb24092f8baa6b741761\r\nebea4e566da67b8329b56cd5678113de17ffcaf9bb292d8684a8886ae44482f8\r\n474ee78c6636ee478ea7f4521559679fbc468bb326357737bfc465e63ed153fa\r\n6427baa1ce5ba37ff6cf3fff79b543018a0a8e8f088c3f66afb24561e4e9de43*\r\n935bab8750187b584e23fb8a522200bcdf526db3c7ece0c6e909ee6e48f4321f*\r\nf48c210d57d291b3d5ef4eba81f8134a79a153996ab8d6d60a10e11b93e3285c*\r\n82bda195fd4b7dffab8543433b5feff47d5ed1c04e3c53c89f9f58fd47123393*\r\n*added to this list on August 28, 2024<\/pre>\n<p>The following domains, IP addresses, and download URLs have been used in connection with Poseidon malware campaigns:<\/p>\n<pre>nextbugs[.]com\r\nzestyahhdog[.]com\r\narc-download[.]com\r\narcthost[.]org\r\nagov-access[.]com\r\nagov-access[.]net\r\nagov-ch[.]com\r\nagov-ch[.]net\r\nregister-agov[.]com\r\nextraiptv.giize[.]com\r\nip.tvguzel[.]com\r\ntv.surebettr[.]com\r\n\r\n37.27.82[.]196\r\n79.137.192[.]4\r\n186.2.171[.]60\r\n\r\ntinyurl[.]com\/ysufhn7t\r\nnextbugs[.]com\/static\/Launcher.dmg\r\nnextbugs[.]com\/static\/Setup.dmg\r\n37.27.82[.]196\/Arc12645413.dmg\r\nstatic.196.82.27[.]37.clients.your-server[.]de\/Arc12645413.dmg\r\nzestyahhdog[.]com\/Arc12645413.dmg\r\nwww.zestyahhdog[.]com\/Arc12645413.dmg\r\nshop.aishabaker[.]com\/about\/\r\n186.2.171[.]60\/AGOV-Access.dmg\r\nagov-access[.]com\/AGOV-Access.dmg\r\nagov-access[.]net\/AGOV-Access.dmg\r\nagov-ch[.]com\/AGOV-Access.dmg\r\nwww.agov-ch[.]com\/AGOV-Access.dmg\r\nagov-ch[.]net\/AGOV-Access.dmg\r\nextraiptv.giize[.]com\/AGOV-Access.dmg\r\nip.tvguzel[.]com\/AGOV-Access.dmg\r\nregister-agov[.]com\/AGOV-Access.dmg\r\ntv.surebettr[.]com\/AGOV-Access.dmg<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers may have attempted to contact one of these domains or IPs in recent weeks, which could indicate a possible infection.<a name=\"other-names\"><\/a><\/p>\n<h3>Do security vendors detect this by any other names?<\/h3>\n<p>Other antivirus vendors&#8217; names for this malware may include variations of the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of OSX\/PSW.Agent.BN, A Variant Of OSX\/PSW.Agent.CD, DMG\/ABTrojan.CVEI-, DMG\/ABTrojan.GJVR-, Gen:Variant.Trojan.MAC.Stealer.35 (B), HEUR:Trojan-PSW.OSX.Amos.gen, HEUR:Trojan-PSW.OSX.Amos.v, HEUR:Trojan-PSW.OSX.Amos.x, IOS\/ABTrojan.JMRU-, IOS\/ABTrojan.MNGB-, IOS\/ABTrojan.UVLX-, Mac.Stealer.43, MAC\/Agent.BN!tr, MacOS:Agent-ANG [Trj], MacOS:AMOS-I [Trj], MacOS:AMOS-O [Trj], MacOS\/ABTrojan.EHNK-, MacOS\/ABTrojan.GIJU-, MacOS\/ABTrojan.MKHZ-, MacOS\/ABTrojan.VDPM-, MacOS\/ABTrojan.XBFH-, Malware.OSX\/Agent.xlntn, Malware.OSX\/AVA.Agent.kweyc, Malware.OSX\/AVF.Agent.zxgsr, Malware.OSX\/AVF.Agent.zxgss, Malware.OSX\/AVI.Agent.eakmx, Malware.OSX\/GM.Agent.UC, Malware.OSX\/GM.Amos.QS, NetWorm ( 0040f4ed1 ), OSX.RodStealer, Osx.Trojan-QQPass.QQRob.Dkjl, OSX.Trojan.Gen, OSX.Trojan.Gen.2, OSX\/Agent.BN!tr.pws, OSX\/Agent.BO!tr.pws, OSX\/Agent.CD!tr.pws, OSX\/Agent.xlntn, OSX\/GM.Agent.UC, OSX\/GM.Amos.QS, OSX\/InfoStl-DH, OSX\/PSW.Agent.BN, OSX\/PSW.Agent.BO, PoseidonStealer, Trojan ( 0040f4e71 ), Trojan-Dropper.OSX.Agent, Trojan-Spy.OSX.Agent, Trojan-Spy.OSX.Amos, Trojan:MacOS\/Multiverze, Trojan.Generic.36478898 (B), Trojan.Generic.36478899 (B), Trojan.Generic.D22C9FB2, Trojan.Generic.D22C9FB3, Trojan.Generic.D45EA4C5, Trojan.Generic.D45EAE22, Trojan.GenericKD.73311429 (B), Trojan.GenericKD.73313826 (B), Trojan.MAC.Generic.119357 (B), Trojan.MAC.Generic.119358 (B), Trojan.MAC.Generic.119365 (B), Trojan.MAC.Generic.119919 (B), Trojan.MAC.Generic.119920, Trojan.MAC.Generic.D1D23D, Trojan.MAC.Generic.D1D23E, Trojan.MAC.Generic.D1D245, Trojan.MAC.Generic.D1D46F, Trojan.OSX.Amos.i!c, Trojan.OSX.Psw, Trojan.OSX.Stealer.i!c, Trojan.Trojan.MAC.Stealer.35, Trojan[PSW]\/MacOS.Amos, Trojan[stealer]:MacOS\/Amos.v, Trojan[stealer]:MacOS\/Amos.x, UDS:Trojan-PSW.OSX.Amos.gen, UDS:Trojan-PSW.OSX.Amos.v, Win32.Troj.Undef.a<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>Be sure to check out Intego&#8217;s previous <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">Mac malware articles<\/a> from 2024 and earlier.<\/p>\n<p>For more information about Poseidon, you can read Moonlock Lab&#8217;s <a href=\"https:\/\/x.com\/moonlock_lab\/status\/1805544922012852586\" target=\"_blank\" rel=\"noopener\">X thread about Poseidon<\/a>, J\u00e9r\u00f4me Segura&#8217;s <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/06\/poseidon-mac-stealer-distributed-via-google-ads\" target=\"_blank\" rel=\"noopener nofollow\">write-up about the Arc variant<\/a>, Archie&#8217;s <a href=\"https:\/\/x.com\/arch1ehic0x\/status\/1806678546607227054\" target=\"_blank\" rel=\"noopener\">X post about the AGOV variant<\/a>, and the Swiss NCSC&#8217;s <a href=\"https:\/\/www.ncsc.admin.ch\/24-poseidon-en\" target=\"_blank\" rel=\"noopener\">write-up about the AGOV variant<\/a> and their <a href=\"https:\/\/github.com\/govcert-ch\/CTI\/tree\/main\/20240627_macOS_PoseidonStealer\" target=\"_blank\" rel=\"noopener\">IOCs list<\/a>.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.<\/p>\n","protected":false},"author":14,"featured_media":101085,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4736,4737,4615,86,4722],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Poseidon macOS malware employs new tricks, targets Swiss Mac users - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-11T16:25:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-29T02:18:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Poseidon AMOS Mac stealer malware variant\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/\",\"name\":\"Poseidon macOS malware employs new tricks, targets Swiss Mac users - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#primaryimage\"},\"datePublished\":\"2024-07-11T16:25:05+00:00\",\"dateModified\":\"2024-08-29T02:18:09+00:00\",\"description\":\"Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Poseidon macOS malware employs new tricks, targets Swiss Mac users\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Poseidon macOS malware employs new tricks, targets Swiss Mac users\",\"datePublished\":\"2024-07-11T16:25:05+00:00\",\"dateModified\":\"2024-08-29T02:18:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#webpage\"},\"wordCount\":1470,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg\",\"keywords\":[\"Arc\",\"Atomic Stealer\",\"Malvertising\",\"Malware\",\"Stealer Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/","og_locale":"en_US","og_type":"article","og_title":"Poseidon macOS malware employs new tricks, targets Swiss Mac users - The Mac Security Blog","og_description":"Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-07-11T16:25:05+00:00","article_modified_time":"2024-08-29T02:18:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg","width":400,"height":260,"caption":"Poseidon AMOS Mac stealer malware variant"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/","name":"Poseidon macOS malware employs new tricks, targets Swiss Mac users - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#primaryimage"},"datePublished":"2024-07-11T16:25:05+00:00","dateModified":"2024-08-29T02:18:09+00:00","description":"Poseidon macOS malware attempts to employ new stealer functionality. It has also been deployed in targeted attacks against Swiss citizens. Learn how to stay safe from the latest macOS threat.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Poseidon macOS malware employs new tricks, targets Swiss Mac users"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Poseidon macOS malware employs new tricks, targets Swiss Mac users","datePublished":"2024-07-11T16:25:05+00:00","dateModified":"2024-08-29T02:18:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#webpage"},"wordCount":1470,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg","keywords":["Arc","Atomic Stealer","Malvertising","Malware","Stealer Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/poseidon-macos-malware-employs-new-tricks-targets-swiss-mac-users\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/07\/Poseidon-AMOS-Mac-malware-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qim","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101082"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=101082"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101082\/revisions"}],"predecessor-version":[{"id":101575,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101082\/revisions\/101575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/101085"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=101082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=101082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=101082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}