{"id":1166,"date":"2009-09-25T16:27:42","date_gmt":"2009-09-25T15:27:42","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1166"},"modified":"2009-09-25T16:27:42","modified_gmt":"2009-09-25T15:27:42","slug":"whats-it-worth-to-infect-a-mac-43-cents","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/","title":{"rendered":"What&#8217;s it Worth to Infect a Mac? 43 Cents"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif\"><\/p>\n<p>More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of &#8220;spam and malware affiliates&#8221; were actively seeking people to infect Macs. Reporting on <a href=\"http:\/\/www.threatpost.com\/blogs\/apple-malware-bounty-infect-mac-earn-043-125\">threatpost<\/a>, Ryan Naraine says that this network was, &#8220;offering $0.43 for each malicious install, a price tag that suggests the Mac platform is becoming more and more lucrative to online crime gangs.&#8221;<\/p>\n<p>While this is a pittance, an effective campaign of using Trojan horses to infect Macs could easily net tens of thousands of computers. This price could interest people in certain countries where the cost of living is much lower than in the West. And, after all, it&#8217;s not that hard to set up a web site with these Trojan horses; the hard part is luring Mac users to them, and getting them to install the malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of &#8220;spam and malware affiliates&#8221; were actively seeking people to infect Macs. Reporting on threatpost, Ryan Naraine says that this network was, &#8220;offering $0.43 for each malicious install, a price tag that suggests the Mac platform is becoming [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of &quot;spam and malware affiliates&quot; were\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s it Worth to Infect a Mac? 43 Cents  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of &quot;spam and malware affiliates&quot; were\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-09-25T15:27:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/\",\"name\":\"What's it Worth to Infect a Mac? 43 Cents - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#primaryimage\"},\"datePublished\":\"2009-09-25T15:27:42+00:00\",\"dateModified\":\"2009-09-25T15:27:42+00:00\",\"description\":\"More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of \\\"spam and malware affiliates\\\" were\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s it Worth to Infect a Mac? 43 Cents\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"What&#8217;s it Worth to Infect a Mac? 43 Cents\",\"datePublished\":\"2009-09-25T15:27:42+00:00\",\"dateModified\":\"2009-09-25T15:27:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#webpage\"},\"wordCount\":146,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif\",\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of \"spam and malware affiliates\" were","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/","og_locale":"en_US","og_type":"article","og_title":"What's it Worth to Infect a Mac? 43 Cents  - The Mac Security Blog","og_description":"More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of \"spam and malware affiliates\" were","og_url":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-09-25T15:27:42+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/","name":"What's it Worth to Infect a Mac? 43 Cents - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#primaryimage"},"datePublished":"2009-09-25T15:27:42+00:00","dateModified":"2009-09-25T15:27:42+00:00","description":"More news from the VB2009 conference. A malware researcher made a presentation describing how a Russian network of \"spam and malware affiliates\" were","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s it Worth to Infect a Mac? 43 Cents"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"What&#8217;s it Worth to Infect a Mac? 43 Cents","datePublished":"2009-09-25T15:27:42+00:00","dateModified":"2009-09-25T15:27:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#webpage"},"wordCount":146,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-it-worth-to-infect-a-mac-43-cents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/VB2009.gif","articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-iO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1166"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1166"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1166\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}