	{"id":103017,"date":"2025-01-31T11:34:01","date_gmt":"2025-01-31T19:34:01","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103017"},"modified":"2025-02-13T11:17:54","modified_gmt":"2025-02-13T19:17:54","slug":"cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/","title":{"rendered":"Cuckoo returns; Mac malware spreads via legit-looking Google Ads"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-103014 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>Over the past couple years, we&#8217;ve written a lot about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer malware that infects Macs<\/a>. One malware family that frequently resurfaces is <strong>Atomic Stealer<\/strong>, or <strong>AMOS<\/strong> (short for Atomic macOS Stealer). AMOS is designed to exfiltrate sensitive data from infected Macs; this typically includes things like saved passwords, cookies, autofill text, and cryptocurrency wallets. A sub-variant known as <strong>Cuckoo<\/strong> first appeared in May 2024.<\/p>\n<p>Just like last year, Cuckoo has been spreading in January 2025 via elaborate campaigns, leveraging malicious but legitimate-looking Google Ads that redirect to lookalike homepages with Trojan downloads. Here&#8217;s everything you need to know about the latest Cuckoo variants, and how to stay protected.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#mimicry\">A brief history of Cuckoo malware<\/a><\/li>\n<li><a href=\"#source\">Don&#8217;t &#8220;just Google it&#8221;<\/a><\/li>\n<li><a href=\"#staysafe\">How can I keep my Mac safe from Cuckoo and other malware?<\/a><\/li>\n<li><a href=\"#iocs\">Indicators of compromise (IOCs)<\/a><\/li>\n<li><a href=\"#other-names\">Do security vendors detect this by any other names?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"mimicry\"><\/a><\/li>\n<\/ul>\n<h3>A brief history of Cuckoo Mac malware<\/h3>\n<p>Atomic macOS Stealer (AMOS, or AtomicStealer) <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\">first surfaced<\/a> in late April 2023. At the time, a threat actor began selling it via Telegram as <strong>malware as a service<\/strong>, licensable for $1,000 per month. Since then, we&#8217;ve seen <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/atomic-stealer\">a plethora of AMOS variants<\/a> emerge.<\/p>\n<p>Most often, AMOS malware is distributed through malicious Google Ads campaigns. These poisoned Google ads appear at the top of search results, where many people will see and click on them. In some cases, the ads are virtually indistinguishable from legitimate Google Ads run by the real software companies they mimic.<\/p>\n<p>Some antivirus companies dubbed a particular sub-class of AMOS variants &#8220;Cuckoo.&#8221; Back in May 2024, we wrote about Cuckoo variants that were spreading via poisoned Google Ads that look like they redirect to the real Homebrew homepage, but in fact led to malware distribution sites.<\/p>\n<h4><strong>Yet another Cuckoo variant emerges<\/strong><\/h4>\n<p>On January 9, 2025, a malware researcher <a href=\"https:\/\/x.com\/gregclermont\/status\/1877294378663784912\" target=\"_blank\" rel=\"noopener\">noted<\/a> that Homebrew was back with a new lookalike homepage.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Cuckoo is back with another fake homebrew website<br \/>brewmacos[.]com<br \/>C2: 185.62.56[.]131<a href=\"https:\/\/twitter.com\/birchb0y?ref_src=twsrc%5Etfw\">@birchb0y<\/a> <a href=\"https:\/\/twitter.com\/AdamJKohler?ref_src=twsrc%5Etfw\">@AdamJKohler<\/a> <a href=\"https:\/\/twitter.com\/L0Psec?ref_src=twsrc%5Etfw\">@L0Psec<\/a> <a href=\"https:\/\/twitter.com\/IntegoSecurity?ref_src=twsrc%5Etfw\">@IntegoSecurity<\/a><\/p>\n<p>&mdash; Gr\u00e9goire Clermont (@gregclermont) <a href=\"https:\/\/twitter.com\/gregclermont\/status\/1877294378663784912?ref_src=twsrc%5Etfw\">January 9, 2025<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>A little over a week later, more reports emerged with additional details; one developer <a href=\"https:\/\/x.com\/ryanchenkie\/status\/1880730173634699393\" target=\"_blank\" rel=\"noopener\">reported<\/a> that he had observed a malicious Google Ads campaign leading to a different fake Homebrew site. The next day, a malware researcher <a href=\"https:\/\/x.com\/JAMESWT_MHT\/status\/1881249774932005270\">posted<\/a> about a third fake Homebrew homepage.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\u26a0\ufe0f Developers, please be careful when installing Homebrew.<\/p>\n<p>Google is serving sponsored links to a Homebrew site clone that has a cURL command to malware. The URL for this site is one letter different than the official site. <a href=\"https:\/\/t.co\/TTpWRfqGWo\">pic.twitter.com\/TTpWRfqGWo<\/a><\/p>\n<p>&mdash; Ryan Chenkie (@ryanchenkie) <a href=\"https:\/\/twitter.com\/ryanchenkie\/status\/1880730173634699393?ref_src=twsrc%5Etfw\">January 18, 2025<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The real Homebrew is a popular macOS software package manager.<\/p>\n<p>Each of the new fake Homebrew homepages tries to trick users into copying and pasting a command from the site into their Mac&#8217;s Terminal app. While that might sound ridiculously suspicious and dangerous\u2014and it normally would be\u2014the legitimate Homebrew software is actually installed in this exact way. <strong>Both the Google Ads and lookalike pages are so convincing that many professionals have said they could have fallen for the scheme.<\/strong><\/p>\n<div id=\"attachment_103018\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-103018\" loading=\"lazy\" class=\"wp-image-103018 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/Homebrew-homepage-fake-AMOS-Cuckoo-malware-campaign-v2.jpg\" alt=\"A fake Homebrew homepage, part of an AMOS\/Cuckoo Mac malware campaign.\" width=\"600\" height=\"479\" \/><p id=\"caption-attachment-103018\" class=\"wp-caption-text\">A fake Homebrew site, part of an AMOS\/Cuckoo Mac malware campaign.<\/p><\/div>\n<p>Compare for yourself. Would you have guessed correctly which is real, and which is fake?<\/p>\n<div id=\"attachment_100579\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-100579\" loading=\"lazy\" class=\"wp-image-100579 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/Homebrew-homepage-real.jpg\" alt=\"The real Homebrew site. Ironically, it has a longer, more suspicious-looking install URL.\" width=\"600\" height=\"479\" \/><p id=\"caption-attachment-100579\" class=\"wp-caption-text\">The real Homebrew site. Ironically, it has a longer, more suspicious-looking install URL.<\/p><\/div>\n<p>Interestingly, this is not the first time that malware has tried to disguise itself as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/homebrew\/\">Homebrew<\/a>. As we mentioned, there was <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\">the first Cuckoo campaign<\/a> in May 2024. Back in 2020, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\">threat actors used another domain<\/a> that was similar to that of the real Homebrew site, as part of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/typosquatting\/\">typosquatting<\/a> campaign. And back <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/\">in 2017, Mac malware known as Dok<\/a> used &#8220;homebrew&#8221; in the filename of one of its LaunchAgents.<a name=\"source\"><\/a><\/p>\n<h3>Don&#8217;t &#8220;just Google it&#8221;<\/h3>\n<p>We strongly recommend that everyone <strong>get out of the habit of &#8220;just Google it&#8221; to find legitimate sites.<\/strong> Such habits often include clicking on the first link without giving it much thought, under the assumption that Google won&#8217;t lead them astray, and will give them the correct result right at the top. Malware makers know this, of course, and that&#8217;s why they&#8217;re paying Google for the number-one position.<\/p>\n<p>Until or unless Google does a much better job of vetting its ads, a better practice than &#8220;Google it&#8221; would be to <strong>bookmark trusted sites whenever possible<\/strong>, and to go back to those bookmarks in the future.<a name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from Cuckoo and other malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects these samples as <strong>OSX\/Amos<\/strong>,\u00a0<strong>OSX\/Amos.ext<\/strong>, and similar names.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. To get started, just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>Following are SHA-256 hashes of malware samples from this Banshee Stealer campaign:<\/p>\n<pre>00c68fb8bcb44581f15cb4f888b4dec8cd6d528cacb287dc1bdeeb34299b8c93\n1dcf3b607d2c9e181643dd6bf1fd85e39d3dc4f95b6992e5a435d0d900333416\n32f3544beaf1c96a8118de27737c88d6a95a0a2d27f9d73ec449cbccc39a22e4*\n6565021aac88563044ddb0308511fb100de58ae7f37ce78d0462e0b0fb91ab2d*\n694280609869d1a89847bb392eb1b2a0914eec8049478b8a1bad14d793b758bc*\n6c6fa44ca63e482946a03ca7d00c81b71e98673c577a20acade4c41877b4031a*\n6d93358ae755823bd3a7b3193e6d8f9012e4e55d4e661d1ea1e7371b88e6ea8a*\n75f9e884dd7dab17a28d661596190f2d54d831494d4328c923c52e2c499362b6*\nb65d9991a98a3507cdd090749c7119d5f880fad0c19d6b32493b4b4add9c92a3*\nbeee7aee468ced6cf375afdcfa929786f80458a510d2e3cfd2c4fced3429fb5e*\nc2422c300ea98a1913be36dcfcc8519f0e096799de576dbd5d322e314aae4e11*\ncdfbcb3d850713c49d451b3e80fb8507f86ba4ad9385e083c2a2bf8d11adc4fb\nce371a92e905d12cb16b5c273429ae91d6ff5485dda04bfedf002d2006856038\nd04f71711e7749a4ff193843ae9ce852c581e55eaf29b8eec5b36c4b9c8699c2\nd8ecc92571b3bcd935dcab9cdbeda7c2ebda3021dda013920ace35d294db07be\ndc6d0decebed37f105b132a7288cb4c269b13a0e7ed0bb923ca08b8c4abcbe9b*\ne774732ed4f7a13f69d8cc8f5c07741369be5370c3b0a961315058ec3022da64*\n3bcd41e8da4cf68bb38d9ef97789ec069d393306a5d1ea5846f0c4dc0d5beaab\u00b0\nb978c70331fc81804dea11bf0b334aa324d94a2540a285ba266dd5bbfbcbc114\u00b0\n*first reported by Intego<\/pre>\n<p>The following are domains through which the malware was distributed:<\/p>\n<pre>brewmacos[.]com\nraw[.]brewmacos[.]com\nbrewe[.]sh\nnorikosumiya[.]com\n<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers may have attempted to contact the GitHub URLs, IP address, or domains above from August 2024 to present, which could indicate a possible infection.<a name=\"other-names\"><\/a><\/p>\n<h3>Do security vendors detect this by any other names?<\/h3>\n<p>Other antivirus vendors&#8217; names for this Banshee Stealer malware for macOS may include variations similar to the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of Generik.HXOPFZO, A Variant Of OSX\/PSW.Agent.CW, Class.trojan.amos, Class.trojan.generic, Class.trojan.stealer, Dmg.trojan.amos, DMG\/ABTrojan.ACGI-, Generic.Trojan.Agent.DY4AJL, HEUR:Trojan-PSW.OSX.Amos.gen, Infostealer\/OSX.Banshee, Js.Trojan.Avi.Ncnw, Mac.PWS.Amos.113, Mac.Stealer.162, Mac.Stealer.164, Macho.trojan.amos, Macho.trojan.macos, Macho.trojan.stealer, MacOS:AMOS-AO [Trj], MacOS\/ABTrojan.CJXU-, MacOS\/ABTrojan.PDHI-1, MacOS\/ABTrojan.RCPO-, Malware.OSX\/AVA.AMOS.enmvm, Malware.OSX\/AVI.AMOS.dplwb, Malware.OSX\/AVI.AMOS.psxni, Malware.OSX\/GM.Amos.WM, Malware.OSX\/GM.Stealer.WX, Osx.Trojan-QQPass.QQRob.Ekjl, Osx.Trojan-QQPass.QQRob.Kzfl, Osx.Trojan-QQPass.QQRob.Nqil, Osx.Trojan-QQPass.QQRob.Qimw, Osx.Trojan-QQPass.QQRob.Rsmw, Osx.Trojan-QQPass.QQRob.Vgil, Osx.Trojan-QQPass.QQRob.Yimw, Osx.Trojan-QQPass.QQRob.Ymhl, OSX.Trojan.Gen.2, OSX\/Agent.CW!tr.pws, OSX\/AVA.AMOS.enmvm, OSX\/AVI.AMOS.dplwb, OSX\/AVI.AMOS.psxni, OSX\/GM.Amos.WM, OSX\/GM.Stealer.WX, OSX\/InfoStl-EC, RiskWare:MacOS\/SAgnt.D9OKG, Trojan ( 0040f5551 ), Trojan:MacOS\/Multiverze, Trojan:MacOS\/SAgnt.D!MTB, Trojan.Generic.37082833 (B), Trojan.Generic.37082904 (B), Trojan.Generic.37128040, Trojan.Generic.37178950 (B), Trojan.Generic.37183801 (B), Trojan.Generic.D235D6D1 [many], Trojan.Generic.D235D718 [many], Trojan.Generic.D2374E46, Trojan.Generic.D2376139, Trojan.Generic.D47D35DE, Trojan.GenericKD.75314654 (B), Trojan.MAC.Generic.122608 (B), Trojan.MAC.Generic.D1DEF0, Trojan.OSX.Amos.i!c, Trojan.OSX.Psw, Trojan.OSX.Stealer.i!c, Trojan.SuspectCRC, Trojan[stealer]:MacOS\/Amos.gyf, Trojan[stealer]:MacOS\/Bitrep.B, Trojan[stealer]:MacOS\/Multiverze.Gen, Trojan[stealer]:MacOS\/SAgnt.D9OKG, TrojanPSW:MacOS\/Other.b6db607e, UDS:Trojan-PSW.OSX.Amos.gen, Win32.Troj.Undef.a<\/span><\/p>\n<p>Other vendors&#8217; names for the related Lumma Stealer malware for Windows may include variations similar to the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of MSIL\/TrojanDropper.Agent.GCY, Artemis!3100C7B441CC, BehavesLike.Win32.Generic.dc, Dropper.Agent!8.2F (CLOUD), Dropper.Agent.Win32.612086, Dropper.Msil.Injuke.Vtw9, Dropper\/Win.Generic.C5689738, Exe.trojan.msil, Exe.unknown.lazy, Gen:Variant.Lazy.622489 (B), Generic ML PUA (PUA), Generic.mg.3100c7b441ccbda8, HEUR:Trojan.MSIL.Injuke.gen, Mal\/Generic-S, Malicious.moderate.ml.score, Malware.kb.c.1000, Malware.Obfus\/MSIL@AI.81, Malware.Obfus\/MSIL@AI.86, Malware.Obfus\/MSIL@AI.88 (RDM.MSIL2:LpzQvUcHrd2UzsKENtWGpg), ML.Attribute.HighConfidence, MSIL\/Agent.GCY!tr, Probably Heur.ExeHeaderL, Pua.Hax, Real Protect-LS!3100C7B441CC, Spyware.Infostealer.Lumma, Static AI &#8211; Malicious PE, TR\/AD.Nekark.flpnz, Trj\/GdSda.A, TROJ_FRS.0NA103KU24, Trojan ( 005b61691 ), Trojan-Dropper.MSIL.Agent, Trojan:MSIL\/Injuke.02be405e, Trojan:MSIL\/Injuke.6787c883, Trojan:Win32\/Phonzy.B!ml, Trojan:Win32\/RedLineStealer!rfn, Trojan.Crypt.MSIL.Generic, Trojan.Ghanarava.17308746390b72e0, Trojan.Heur!.03012281, Trojan.Injuke!QH3z+Gn5P3I, Trojan.Lazy.D97F99, Trojan.Malware.300983.susgen, Trojan.Malware.74181957.susgen, Trojan.Msil.Kryptik.16001475, Trojan.PWS.Lumma.868, Trojan.TR\/AD.Nekark.flpnz, Trojan.Win.Z.Lazy.294912.D, Trojan.Win32.GenusT.ECRG, Trojan.Win32.Injuke.16!c, Trojan.Win32.Save.a, Trojan[dropper]:MSIL\/RedLineStealer.Gen, VHO:Trojan.MSIL.Injuke.gen, W32.AIDetectMalware.CS, W32.Common.A2FE11FC, W32\/ABTrojan.SZLY-6453, W32\/MSIL_Kryptik.LQV.gen!Eldorado, Win\/malicious_confidence_100% (W), Win32:PWSX-gen [Trj], Win32.HeurC.KVMH008.a<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>This article will be updated soon with additional indicators of compromise (IOCs) for the Mac malware samples and malicious domains used in this Cuckoo campaign. Check back here and refresh the page later for further technical details.<\/p>\n<p>To learn more about the previous Cuckoo variant, see <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\">Intego&#8217;s original report on OSX\/Cuckoo malware<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"OA66Ga0n14\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/\">Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Intego discovers new &#8220;Cuckoo&#8221; Mac malware mimicking Homebrew&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-cuckoo-mac-malware-mimicking-homebrew\/embed\/#?secret=OA66Ga0n14\" data-secret=\"OA66Ga0n14\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Be sure to also check out our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-mac-and-iphone-malware-of-2024-and-what-to-expect-in-2025\/#forecast\">2025 Apple malware forecast<\/a> and our previous <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">Mac malware articles<\/a> from 2025 and earlier.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.<\/p>\n","protected":false},"author":14,"featured_media":103012,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4737,4738,4615,86,4722],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuckoo returns; Mac malware spreads via legit-looking Google Ads - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-31T19:34:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T19:17:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"OSX\/Cuckoo Mac macOS malware logo v4\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/\",\"name\":\"Cuckoo returns; Mac malware spreads via legit-looking Google Ads - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#primaryimage\"},\"datePublished\":\"2025-01-31T19:34:01+00:00\",\"dateModified\":\"2025-02-13T19:17:54+00:00\",\"description\":\"Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cuckoo returns; Mac malware spreads via legit-looking Google Ads\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Cuckoo returns; Mac malware spreads via legit-looking Google Ads\",\"datePublished\":\"2025-01-31T19:34:01+00:00\",\"dateModified\":\"2025-02-13T19:17:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#webpage\"},\"wordCount\":1649,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg\",\"keywords\":[\"Atomic Stealer\",\"Homebrew\",\"Malvertising\",\"Malware\",\"Stealer Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/","og_locale":"en_US","og_type":"article","og_title":"Cuckoo returns; Mac malware spreads via legit-looking Google Ads - The Mac Security Blog","og_description":"Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-01-31T19:34:01+00:00","article_modified_time":"2025-02-13T19:17:54+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg","width":400,"height":260,"caption":"OSX\/Cuckoo Mac macOS malware logo v4"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/","name":"Cuckoo returns; Mac malware spreads via legit-looking Google Ads - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#primaryimage"},"datePublished":"2025-01-31T19:34:01+00:00","dateModified":"2025-02-13T19:17:54+00:00","description":"Mac malware known as Cuckoo has resurfaced, spreading via legit-looking Google Ads and homepages disguised to look like Homebrew.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Cuckoo returns; Mac malware spreads via legit-looking Google Ads"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Cuckoo returns; Mac malware spreads via legit-looking Google Ads","datePublished":"2025-01-31T19:34:01+00:00","dateModified":"2025-02-13T19:17:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#webpage"},"wordCount":1649,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg","keywords":["Atomic Stealer","Homebrew","Malvertising","Malware","Stealer Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/cuckoo-returns-mac-malware-spreads-via-legit-looking-google-ads\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/01\/OSX-Cuckoo-Mac-macOS-malware-logo-v4-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qNz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103017"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103017"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103017\/revisions"}],"predecessor-version":[{"id":103027,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103017\/revisions\/103027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/103012"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}