{"id":10857,"date":"2013-02-20T12:07:25","date_gmt":"2013-02-20T20:07:25","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10857"},"modified":"2016-02-12T10:35:59","modified_gmt":"2016-02-12T18:35:59","slug":"what-we-know-about-apples-malware-breach","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/","title":{"rendered":"What We Know About Apple&#8217;s Malware Breach"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10921\" title=\"rotten-apple-image\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The coverage surrounding Apple&#8217;s recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful information. Normally, in the wake of malware incidents, information and samples travel quickly through the security community so that everyone can make sure our users are protected. But as of this moment, there is more rumor and innuendo than fact about what actually happened. And rather than directly contacting the owner of the affected sites so they can clean things up and protect their users, site owners are just now hearing the news from journalists.<\/p>\n<p>The current theory is that this malware was spotted on an iPhone developer&#8217;s forum, where developers working for at least Facebook, Twitter, and Apple were infected by way of a Java exploit. If this is the case, the attack was not so much targeted as it was going after a niche market. The breach caused by the malware probably did not leak any customer data (it would be unusual for developers to have that info), but it remains to be seen what effect the attackers had on the machines they infiltrated. The exploit may have been a zero-day threat that may have been patched by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/oracle-apple-patched-vulnerable-java-after-apple-hacked-by-cybercriminals\/\">the latest Oracle and Apple updates<\/a>.<\/p>\n<p>This attack may have been planted by malware authors from Eastern Europe (probably not China) and may have led infected users to install what we detect as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/pint-sized-backdoor-for-os-x-discovered\/\">OSX\/Pintsized.A<\/a>. If so, the threat has been effectively neutralized for the time being, as the controllers&#8217; servers have been sinkholed. This is not something the average home user would likely have to worry about, at least for now.<\/p>\n<p>What we do know is this:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/java-is-still-not-particularly-safe\/\">Java is still causing a lot of malware problems<\/a> for people.<\/li>\n<li>Everyone should update to the latest Java version at the very least, or remove Java if you&#8217;ve not already done so.<\/li>\n<li>If you&#8217;re still running Java 6, run <a href=\"http:\/\/support.apple.com\/kb\/HT5666\">Apple&#8217;s Java update<\/a> for its malware removal tool.<\/li>\n<\/ul>\n<p>AV is meant to detect known-bad things, and as this was previously unknown, odds are it would not have caught this. <a href=\"https:\/\/www.intego.com\/virusbarrier#\/net-barrier-2013\">Firewalls<\/a> are meant to detect unknown network traffic and would likely have alerted on this. By having layered security on your machine, you increase the chances of being able to prevent incidents like these.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The coverage surrounding Apple&#8217;s recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful information. Normally, in the wake of malware incidents, information and samples travel quickly through the security community so that everyone can make sure our users are protected. But as of this moment, there is [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10913,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[3151,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The coverage surrounding Apple&#039;s recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What We Know About Apple&#039;s Malware Breach - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The coverage surrounding Apple&#039;s recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-20T20:07:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:35:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\",\"name\":\"What We Know About Apple's Malware Breach - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#primaryimage\"},\"datePublished\":\"2013-02-20T20:07:25+00:00\",\"dateModified\":\"2016-02-12T18:35:59+00:00\",\"description\":\"The coverage surrounding Apple's recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What We Know About Apple&#8217;s Malware Breach\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What We Know About Apple&#8217;s Malware Breach\",\"datePublished\":\"2013-02-20T20:07:25+00:00\",\"dateModified\":\"2016-02-12T18:35:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#webpage\"},\"wordCount\":388,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"keywords\":[\"Apple\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The coverage surrounding Apple's recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/","og_locale":"en_US","og_type":"article","og_title":"What We Know About Apple's Malware Breach - The Mac Security Blog","og_description":"The coverage surrounding Apple's recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-02-20T20:07:25+00:00","article_modified_time":"2016-02-12T18:35:59+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/","name":"What We Know About Apple's Malware Breach - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#primaryimage"},"datePublished":"2013-02-20T20:07:25+00:00","dateModified":"2016-02-12T18:35:59+00:00","description":"The coverage surrounding Apple's recent malware-related breach has been maddeningly sparse and has led to as much misinformation as valid, useful","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What We Know About Apple&#8217;s Malware Breach"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What We Know About Apple&#8217;s Malware Breach","datePublished":"2013-02-20T20:07:25+00:00","dateModified":"2016-02-12T18:35:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#webpage"},"wordCount":388,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","keywords":["Apple","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2P7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10857"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10857"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10857\/revisions"}],"predecessor-version":[{"id":13157,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10857\/revisions\/13157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10913"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}