{"id":102306,"date":"2024-11-08T10:56:50","date_gmt":"2024-11-08T18:56:50","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=102306"},"modified":"2025-01-14T11:57:38","modified_gmt":"2025-01-14T19:57:38","slug":"99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/","title":{"rendered":"99 reasons you need Mac antivirus: a plethora of stealer malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-102308\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>People often ask whether Macs really need antivirus software. If you browse Apple forums, you&#8217;ll inevitably find people who claim you don&#8217;t need malware protection. We&#8217;ve <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">debunked Mac malware myths<\/a> in the past, and we&#8217;ve written literally <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">hundreds of articles<\/a> about malware that infects Apple devices.<\/p>\n<p>But if you needed any additional convincing, Intego&#8217;s team of malware analysts recently discovered more than <strong>99 unique new samples<\/strong> of stealer malware. This suggests that Mac malware is not so rare; rather, threat actors are pumping out numerous samples, trying to evade detection in wide-reaching campaigns.<\/p>\n<p>Here&#8217;s everything you need to know to stay safe from the latest Mac malware threats.<\/p>\n<h3>Base64-encoded shell scripts<\/h3>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Intego&#8217;s malware analysis team recently encountered 99 unique samples of Base64-encoded shell scripts. The contents of these files look similar to the following (shortened to fit better):<\/span><\/p>\n<pre>\/bin\/bash\r\nbFJfVXss='IyEvYmluL2Jhc2gKb3Nhc2NyaXB0IC1lICdv[\u2026]'\r\nIKBIKmYz='dXBWb2x1bWUgaXMgIiIgdGhlbgogICAgICAg[\u2026]'\r\ndtIUkpzw='CAgIHNldCBleGVjdXRhYmxlTmFtZSB0byA[\u2026]=='\r\nencoded_script=\"${bFJfVXss}${IKBIKmYz}${dtIUkpzw}\"\r\nbash -c \"$(echo \"$encoded_script\"\r\nbase64 -D)\"<\/pre>\n<p>If that looks like incomprehensible gobbledygook, that&#8217;s exactly the point. This malware uses a common technique called obfuscation to obscure or hide what it really does. Specifically, the script incorporates three Base64-encoded strings, mashes them together, decodes them, and runs the decoded output as a command.<\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">So what does the decoded output look like? It&#8217;s another bash script, containing AppleScript code with embedded shell scripts. This code repeatedly checks for the presence of a mounted volume named Installer. If it finds a volume with that name, it attempts to copy an executable file (app), also named Installer, to the hidden <code>\/tmp<\/code> folder on your Mac.<\/span><\/p>\n<p>Next, it tries to run these three commands:<\/p>\n<pre>do shell script \"xattr -c \" &amp; quoted form of tmpExecutablePath\r\n[\u2026]\r\ndo shell script \"chmod +x \" &amp; quoted form of tmpExecutablePath\r\n[\u2026]\r\ndo shell script quoted form of tmpExecutablePath<\/pre>\n<p>The command <code>xattr -c<\/code> removes all extended attributes from a file; in this case, the intent is to ensure the file doesn&#8217;t have the <code>com.apple.quarantine<\/code> attribute that could prevent it from running. Next, <code>chmod +x<\/code> makes the file executable, i.e. runnable as an application from the command line. Finally, the script runs the malicious <code>\/tmp\/Installer<\/code> application.<\/p>\n<h3>&#8220;Installer&#8221;? Nope; it&#8217;s stealer malware<\/h3>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">And what about these fake &#8220;Installer&#8221; applications that the script looks for, copies, and runs?<\/span><\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">They&#8217;re actually stealer malware, designed to gather and exfiltrate cryptocurrency wallets, browser cookies, Microsoft Word documents, and more.<\/span><\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">As we&#8217;ve mentioned in previous articles, cookies can give attackers access to accounts your browsers are logged into\u2014bypassing your password and any two-factor authentication methods.<\/span><\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Interestingly, these stealers even target relatively obscure browsers that we&#8217;ve mentioned before: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-chrome-firefox-which-is-the-most-private-browser-for-mac\/\">Pale Moon and Waterfox<\/a>, which are forks (derivatives) of Mozilla Firefox. Of course, they also target more common browsers, including Safari, Firefox, and Google Chrome. These stealers are also designed to extract data from several other Chromium-based browsers, such as Arc, Brave, Microsoft Edge, Opera, Opera GX, and Vivaldi.<\/span><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from stealer malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects samples from this campaign as <strong>OSX\/Amos.ext<\/strong>, <strong>OSX\/Amos.gen<\/strong>, <strong>OSX\/Amos.scpt<\/strong>,\u00a0<strong>OSX\/PSW.ext<\/strong>, <strong>Python\/Stealer.gen<\/strong>, and <strong>virus\/OSX\/AVI.Agent.cpdf<\/strong>.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s latest Mac operating system, macOS Sequoia.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. Just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware, too.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>Following are SHA-256 hashes of malware samples from this campaign:<\/p>\n<pre>05d0191859cb1f8d1351b1ec557a7b9dc669d9143b93c50a69ddfdafc6abb030\r\n07acd31fccd8ac0d305913f0c35b226700d5cc641f012aadde26a6ccb6358b33\r\n0e04423fc0ad2de4ce31d454b4bd89d5744cf8fbb5e1546ba06b8ba387d6eb5f\r\n0f7e3138899df8304c2da1b3a5ce18f721247e943f9f9ee17df375a07403b844\r\n13b564fd0913f98d78d0fdef5f1e9b6de0bd480bd708ab97b150511e6168180c\r\n1491e2a46bc2fe5f1072652bb828d7d286d258e9d46bf5ca3ca97d6ef8f24f80\r\n184073c67cbd557cac9ccc17e60c2061965e90f776d219afc9638b16e0a96115\r\n18525523466ca2f612b403f6f2cb9ed2ae24a8558fcf38e3a2589b0c489ff0bd\r\n1998a4ec680c551fe9635b21bbd687f843984020b936fc3e99dd83bf7bf03100\r\n1b6ac1be6b3f6ebeafe40e2fab4e6383ba90f988e2570833cabac00eae167087\r\n1c636552377f72f010c192ca94b036f7ed31fe96180e427a247a7785f5af1b47\r\n2231bc2928bef007b52ed6b1d8409285a6455f159a60d2f60f7ef1068ebe9bc5\r\n232646f8322aa0b84f463d7a0df20c1ed4c8bc8b06bd885df06e3f5a430aebd8\r\n245ca71a4f2c4e7754ddeb37cbb4132769035e0d87f01865e525faffaa4cb5b6\r\n2557f8f927aa6c9e1cc1226793776bdb2529cc69a0b4d9d8222581fa570ffc15\r\n2574dada45cef789a4987a92bd45f8dbfdadd68951a6b9229772138be9b248f8\r\n25e8f9885d4c8d5ae505671f10ce51717f37e18be27494f5e3d7ba73a1b575ab\r\n27556f569018e8b933aaf360c6b9df3da56a0dd63946c66810309692043a39c3\r\n2a2e815fc4898fb1e6c25240e55355f8454191f1049f7d1222c4c41a66582d6a\r\n3231ab1a51a2241f1ba995bb0abb53f633cd69eee0a30936edf1bac8fe304d3c\r\n32cd47bce63122b7437cba4e4ef80f9782b3db2ca745c2eaa63059a815d9a122\r\n3e55d3c06b5c182cbd2c652abe3f42b02b1fe20cf9d98cf254ba50db86d18cfd\r\n3fcdb4e0e6fbc95a784f102ca1df2985e2bb6593a095695815ece654a5a6d871\r\n40c2cb04c62079e4a922a87c3da93a5dad3ca1b1af60528e02aed8cbaa103eea\r\n443e64c2d907f2d8e538381563318fc0044414577e6e3f756b0e17dc8c92438f\r\n4d1663bdce1b5b933ed46cbcab5525cc3678ec0fea2fe5c804304a29313965b3\r\n4d173201eb8fce4ef09d7136ce13b51a30353dc20de1d19d247e1b0a3c498f5a\r\n4e9a17c8d6a767763a3cdd0916d6f06cc1c8f6efc3a127bafd58cbbecda205f9\r\n52e03571d1849dadbe76eb726accdd1b57fea8353937391ea6fa2b6c5f5f5acb\r\n53094b1c1cdf8dca3614f120920c490292b7c27ba1ae081e7c516f4a4193b03c\r\n53300d49d53f151ddf4ae8f0c440baf473c5b34328cc78558e02006fa53f203f\r\n54c1f2edf60778f188540017f90702e69073e3cacdbc57e42ccf0cbe8a1d1d1c\r\n558ced01205a61cc50c2916ebd602780c20d0ca529eb0852ed1336040d38d328\r\n58ed408137187dd4908f6ac5b3455577c92830d62ad03587cd128b552e284f81\r\n5cab898dab1a62cf5ff22814be1b850b19de3d61287efb99b4b1509ce68232cc\r\n5d807cca33f30f188b7243b85015da74a03be0cf7a8b4d2c2f292d5a932e9dec\r\n5f944788b4b0bf4ead295ce15bb3d07cb4118a8f1b1b86e1e6677efbab2cb0bf\r\n6124b4be45e5538814f155d1783a3ec10f77a4cfa208a151888969ce5b5967a4\r\n615235a5ec577ccc3eee2786f6600b1822dfb7bb3d2331029a28f9382734f8ff\r\n662d53dda59bbffca9b51ca7a66f57e20dafb144754aaa6324ab90ce8867e481\r\n667be64cb8e04f88f85a790cb50a6f13254467ed427dc0aaaf1a0198c5fb4537\r\n671ea06a6c2666cfca6ea6378bf3288b3f6ba3d115311bbee3d6f5e455ef4626\r\n690996789726b4a528c1efec030032e479284d950961e623e5cba68bb72d33d9\r\n726d057e9dc97ca9ee876d10a3a76bba21359c922bc39a08887a6a8222ae8f09\r\n7c87ad713186ca53e9bceac16f05d2837195499c7a5f14fcbf12ec9eeb17ddbc\r\n7da3cce80969ba7265dd31819fd93ffdd8e8170dd57e8e93a02b3b0c0dd89560\r\n7f8bdbbb901d822beabf4d8baeaa0d5a58c7b2815618c656e6579a73056b6285\r\n835c9425a4602fee6d81f0b505edb95740ba79f147997b70d829d94ca652ec6c\r\n83e5bacd77f5d4ea4efd9d7a0242b025847aef2b82925e215981b2a144ae68df\r\n841f76e0ef22ea00944904b74ee77f280d4c3e866ea872de5d114baf5853f776\r\n883e32b10dcadbea46935addbfe6605b4abee444daae4cf8738a0f9b01d716eb\r\n887234559284de5a780f21f480a95c7b46d61b34c03e25d8baa035b58479f292\r\n892bacf0645bcc0092c243ef36ef6b8aa1e1927f978c76e60b60957869d26b74\r\n8a0feac5df5dd947098cae3c47fcee1fb84a39129640ca017b9e04d1f84575fb\r\n8ac79a74115b60c3b4b54550c919833d506ada4048511f35cda876454265b36c\r\n8ecbeb88802774970ea96cff2c62d81e76be0490e7c0d91efa4d59b3474f7a37\r\n8f8bd796c6c48318b4747336ea656380f76528c9fdeb0718d74e4bc899a901b8\r\n921d50f7246f519517cda9429776b53501521536f5930c0ad97c5dbdbd2c6eee\r\n983c92d42a12226d4d95fed540badf322bd8ad04fb3f800c055506b954684ce3\r\n98836b0bc5b585cef81635c02ecac4f5306ccd8f9864af8bd3b0e29a190a379b\r\n99dccbf87057758183709976d076912cc54c74635f24d3f24f13f3c879207039\r\n9b506afb34351584ca292ccc7995622a6deba969bdb77d69dfe3292c90c890e2\r\n9b8f60f7ac51d7862314c0d5da7aa472d1f8d5809ed48cd39f0da9c21d11f88a\r\n9bc9e07dd365b0726b1a59368fc3e5911388e42008c5c16183e8e447b3fa3f2f\r\n9ef4a4d507c89654de034cc0e7748ae8b7fa75833b8dcab629ef6c5bc0491809\r\na40b987825770fca279a72449c0bb112e4abbf23cd7c678a61576f22987f6054\r\na6376a822d4521ef04ffcbdcb4492581d0001443c45b248eb90e29c66631dc36\r\nb30a5622429dbc81c34b080a474cf6ae746de046abedebc5dc804c099e709796\r\nb5d792db42e0c5326d8928680756953a87ff25f5b3e0033a568d75a0fcfe451b\r\nb8162a3356eb92af148f8c63940b35d513ae4d4c20b53e6a9a237965ad552adf\r\nb8fe38d0e182d8d91e22edef360237164c04711db5fd7f304d83a56dbb520369\r\nbe40910037f36f6591e80fb5c76c91a7f4c91c0c3dbccdaaa9bbf4509c012351\r\nbe83787edbff91207dc09559865f0b0d9fbff59b0e5d1fcf2e05e3391b6ec3b0\r\nbec747a001cad25f3763d2d2eb496d7458998d707fd7fac116bd26c6e30e2686\r\nc075ea87e75a369b8dfbb58d7fffa3a052afdf58b00e1885ac78f7f4ac81a92d\r\nc1496b2a1463bc1cf612b5d5f10719c56eac85f333990f4763d57680b68c8880\r\nc1fee5bb5dcaaafedc97e15fd94bfd7da636f3b31db7745a7edc75c7f05f1bbf\r\nc26d1d72dcdbfba8f0d930fe12869611d5bf1a4f2f54ca20b6c12342371d6161\r\nc73e64aeea99514f620cc1391ab438541a0119bf2b0f688eb5ba57f2eda86b25\r\nce5a1259cd40d17e6ff41e6e2a39cb6f86c095b8b2b8969740c16b57159eddd2\r\nd0ca3040ecf2861415cf7827b4e5b6ce284bd9876303012d581dd382d04f1ff0\r\nd412dd57c2c9c660a25c245985b22d6afa43b8e8687eb8db28487ab819c7853a\r\nd56f9b68cc59173bcd3c57538b6b24a694752fb6bcc5f8af7151ed2897e8ba8c\r\ndd90f50244ed9da1f69c4ce09e14912b5bacb6f39d86bc7a494024c1d09d60e4\r\ne51f5f7d4b7e84fb9a94acf4397b7065ba2e767bb1ea5707bb9ec9b2817e736e\r\ne5ab39fd917dd128e0182d3b4f465331247042055fc059cea046e7a6d050678b\r\ne87fa3c7672531aff90f97d3d7cf49c67f3b7ef9f201ddcda7d99065cd954ffd\r\ne94f2d250306dffb317eaaa27631ec7470d1495d08bccc2ca0e4ebe84d746681\r\neaf2351a67e069d3714dbb9166112524140f55079b9d39bf9e04b0d130e64462\r\nec08ae2ceab5530035a3e4a0392ad0a026fbf00fbafcf07ecdbcd7018bc28e73\r\neec5313f7977a9058d34d4ed0ab0bb0b64d880ed5846a9654ad7a0a583022965\r\neec591891624ae844c21f66821b186997f587c78ba16a7e6ddcfb7f8c178368f\r\nef1c9398faa6bbf9e4bee5c0752e2f67864e1d8290cc53e4f07f3415a37b56d4\r\nf4f4f694487fce60ed53c3ba2c71d9752ca23de23a1198c2002f029184c36dea\r\nf77246fe8696c2b8d49e1e8954794ffa58e6957470d97713abd3cc8963bf0791\r\nf8bd848c9aa70840f51ce4670bb58855e49ef6811b8138711f5c2f30fb6392f0\r\nf97b12b4751f5d4257016cdec03aca22cb2aaaefd9d4e7b84397798abde2391b\r\nf9e6234132b3e2d7730f2561f00e9347783657e88a06f6d82afd15c3463f50f6\r\nfeeafcd92d0f2ed799667c1c1eda20ac2ce0a35259822f2be4dec0977e08ab0e\r\nbc730342fd06de6f9ea20ff3a60e307226ab3ddf70c3488cdcace1f151175715\r\n<\/pre>\n<p><a name=\"other-names\"><\/a><\/p>\n<h3>Do security vendors detect this by any other names?<\/h3>\n<p>Other antivirus vendors&#8217; names for this malware may include variations similar to the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of OSX\/PSW.Agent.CT, ABTrojan.AUOA-, BASH\/Agent.CS!tr, BV:Dropper-DE [Trj], Class.trojan.amos, Generic.Trojan.Agent.L02KKB, HEUR:Trojan-PSW.OSX.Amos.ad, HEUR:Trojan.OSX.Amos.a, Mac.Siggen.324, MAC\/Agent.CT!tr.pws, MacOS:Agent-APW [Trj], MacOS:AMOS-AF [Trj], MacOS:AMOS-AH [Trj], MacOS:AMOS-P [Trj], MacOS\/ABTrojan.RXQD-, Malware.OSX\/AVI.Agent.cpdfd, Osx.Trojan-QQPass.QQRob.Ikjl, Osx.Trojan-QQPass.QQRob.Psmw, OSX.Trojan.Agent.78VCMN, Osx.Trojan.Amos.Rsmw, OSX.Trojan.Gen.2, OSX\/PSW.Agent.CS, RiskWare:MacOS\/Agent.CB, RiskWare:MacOS\/Agent.CS, Script.Trojan.Agent.5VWPZD, Shell.trojan.amos, Shell.trojan.macos, TR\/AVI.Agent.bhmqa, TR\/AVI.AMOS.bpkxb, Trojan (0040f5431), Trojan-PSW.OSX.Amos, Trojan:MacOS\/Amos.CC!MTB, Trojan:MacOS\/Multiverze, Trojan:Script\/Wacatac.B!ml, Trojan.Generic.36896599 (B), Trojan.Generic.D232FF57, Trojan.Linux.Generic.401525 (B), Trojan.Linux.Generic.D6249A [many], Trojan.MAC.Generic.121578 (B), Trojan.MAC.Generic.D1DAEA [many], Trojan.OSX.Amos.i!c, Trojan.OSX.Psw, Trojan.Script.Amos.4!c, Trojan.Script.Generic.4!c, Trojan.TR\/AVI.Agent.bhmqa, Trojan.TR\/AVI.AMOS.bpkxb, UDS:Trojan.OSX.Amos, Win32.PSWTroj.Undef.a<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\u2014meaning threat actors are ramping up attacks against Apple computers.<\/p>\n","protected":false},"author":14,"featured_media":102310,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4736,4737,4543,38,173,4682,41,56,181,86,4607,93,4722,4680],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\u2014meaning threat actors are ramping up attacks against Apple computers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"99 reasons you need Mac antivirus: a plethora of stealer malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\u2014meaning threat actors are ramping up attacks against Apple computers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-08T18:56:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-14T19:57:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac stealer malware cartoon burglar robber running with a sack bag dropping files and cookies\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/\",\"name\":\"99 reasons you need Mac antivirus: a plethora of stealer malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#primaryimage\"},\"datePublished\":\"2024-11-08T18:56:50+00:00\",\"dateModified\":\"2025-01-14T19:57:38+00:00\",\"description\":\"If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\\u2014meaning threat actors are ramping up attacks against Apple computers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"99 reasons you need Mac antivirus: a plethora of stealer malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"99 reasons you need Mac antivirus: a plethora of stealer malware\",\"datePublished\":\"2024-11-08T18:56:50+00:00\",\"dateModified\":\"2025-01-14T19:57:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#webpage\"},\"wordCount\":947,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg\",\"keywords\":[\"Arc\",\"Atomic Stealer\",\"Brave\",\"Chrome\",\"Chrome Browser\",\"Chromium\",\"Cookies\",\"Firefox\",\"Google Chrome\",\"Malware\",\"Microsoft Edge\",\"Opera\",\"Stealer Malware\",\"Vivaldi\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\u2014meaning threat actors are ramping up attacks against Apple computers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/","og_locale":"en_US","og_type":"article","og_title":"99 reasons you need Mac antivirus: a plethora of stealer malware - The Mac Security Blog","og_description":"If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\u2014meaning threat actors are ramping up attacks against Apple computers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-11-08T18:56:50+00:00","article_modified_time":"2025-01-14T19:57:38+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg","width":400,"height":260,"caption":"Mac stealer malware cartoon burglar robber running with a sack bag dropping files and cookies"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/","name":"99 reasons you need Mac antivirus: a plethora of stealer malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#primaryimage"},"datePublished":"2024-11-08T18:56:50+00:00","dateModified":"2025-01-14T19:57:38+00:00","description":"If you think Macs are immune to malware, think again. Intego recently discovered 99 unique samples of stealer malware\u2014meaning threat actors are ramping up attacks against Apple computers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"99 reasons you need Mac antivirus: a plethora of stealer malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"99 reasons you need Mac antivirus: a plethora of stealer malware","datePublished":"2024-11-08T18:56:50+00:00","dateModified":"2025-01-14T19:57:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#webpage"},"wordCount":947,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg","keywords":["Arc","Atomic Stealer","Brave","Chrome","Chrome Browser","Chromium","Cookies","Firefox","Google Chrome","Malware","Microsoft Edge","Opera","Stealer Malware","Vivaldi"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/99-reasons-you-need-mac-antivirus-a-plethora-of-stealer-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/11\/Mac-stealer-malware-cartoon-burglar-running-sack-files-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qC6","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102306"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=102306"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102306\/revisions"}],"predecessor-version":[{"id":102329,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102306\/revisions\/102329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/102310"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=102306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=102306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=102306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}