	{"id":14929,"date":"2017-06-10T13:01:30","date_gmt":"2017-06-10T20:01:30","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=14929"},"modified":"2023-05-11T09:46:19","modified_gmt":"2023-05-11T16:46:19","slug":"operating-systems-are-meaningless-to-malware-developers","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/","title":{"rendered":"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/hazmat.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-14943\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/hazmat.jpg\" alt=\"hazmat\" width=\"500\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/hazmat.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/hazmat-150x120.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/hazmat-300x240.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are <a href=\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-data-not-just-your-computer\/\" rel=\"noopener\">more concerned with data<\/a>, than with what operating system (OS) the data is stored on. We\u2019re also seeing more and more <a href=\"https:\/\/www.intego.com\/mac-security-blog\/clapzok-a-multi-platform-virus\/\" rel=\"noopener\">multi-platform malware<\/a> as well as threats created by groups that have historically written Windows malware. Historically, those multi-platform malware were written for Windows and Macs, and often Linux as well. Now, predictably, <a href=\"https:\/\/web.archive.org\/web\/20130613010625\/https:\/\/www.informationweek.com\/security\/mobile\/android-trojan-looks-acts-like-windows-m\/240156254\" target=\"_blank\" rel=\"noopener\">Android malware is starting to behave more like Windows malware<\/a>.<\/p>\n<p>There are two big factors that play into the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsofts-shrinking-share-is-sending-malware-elsewhere\/\" target=\"_blank\" rel=\"noopener\">shift in malware to other operating systems<\/a>. Arguably the most important factor is that Windows market share has decreased significantly. The second factor is a trend that started even before that decrease; computer users now spend more time interacting with a browser than the OS itself. Now with the advent of cloud computing, you can have access to your data, regardless of where you are or what OS you\u2019re using.<\/p>\n<p>On the one hand, this splintering of the OS market has made things more difficult for malware authors. No longer does malware that works on one OS get you access to the vast majority of computer users worldwide. Now, in order to get that same sort of audience, attackers must come up with something that works on several significantly different platforms. Because there is an ever-growing financial incentive, malware authors have risen to the challenge.<\/p>\n<p>Because everyone uses virtually the same Web browsers across all major operating systems, malware authors can simply find vulnerabilities to exploit in one of these browsers and they\u2019ll generally have a stealthy way into almost any user\u2019s system. From there, they just need to add back-end functionality to do what they need to do. And since most malware now is variations on a theme of stealing data, and since the malware community tends to be very cooperative with sharing source code amongst themselves, that\u2019s not been much of a hurdle.<\/p>\n<p>I think, in a \u201cpost-PC\u201d world, many people have grown complacent about securing their data. That may be especially true of Apple product users. Apple has marketed itself as\u00a0 privacy-focused, and its products as being immune to &#8220;PC viruses,&#8221; which has tricked a generation of Mac and iPhone users into thinking they can be as cavalier as they want. But <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/mac-malware\/\">new Mac malware is being discovered all the time<\/a>, and there&#8217;s even nation-state sponsored spyware like <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/pegasus\/\">Pegasus<\/a> for iPhone.<\/p>\n<p>Unlike end users, however, malware authors have not been complacent about stealing data. In fact, they\u2019re taking the lessons learned from years of writing Windows malware and applying it to other operating systems so that they can make vast leaps in sophistication and stealthiness.<\/p>\n<p>So remember to lock your stuff up, and keep a healthy level of paranoia, regardless of which device you\u2019re using.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/ericconstantineau\/5658369556\/\">Eric Constantineau &#8211; www.ericconstantineau.com<\/a> via photopin <a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the data is stored on. We\u2019re also seeing more and more multi-platform malware as well as threats created by groups that have historically written Windows malware. Historically, those multi-platform malware [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14945,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[705,707],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-10T20:01:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T16:46:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/\",\"name\":\"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#primaryimage\"},\"datePublished\":\"2017-06-10T20:01:30+00:00\",\"dateModified\":\"2023-05-11T16:46:19+00:00\",\"description\":\"If you\\u2019re a regular reader of this blog, you\\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers\",\"datePublished\":\"2017-06-10T20:01:30+00:00\",\"dateModified\":\"2023-05-11T16:46:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#webpage\"},\"wordCount\":497,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png\",\"keywords\":[\"malware developers\",\"Operating Systems\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/","og_locale":"en_US","og_type":"article","og_title":"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers - The Mac Security Blog","og_description":"If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-06-10T20:01:30+00:00","article_modified_time":"2023-05-11T16:46:19+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/","name":"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#primaryimage"},"datePublished":"2017-06-10T20:01:30+00:00","dateModified":"2023-05-11T16:46:19+00:00","description":"If you\u2019re a regular reader of this blog, you\u2019re well aware that malware authors are more concerned with data, than with what operating system (OS) the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Are Apple Devices Safer? Why Your OS Is Meaningless to Malware Makers","datePublished":"2017-06-10T20:01:30+00:00","dateModified":"2023-05-11T16:46:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#webpage"},"wordCount":497,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png","keywords":["malware developers","Operating Systems"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/operating-systems-are-meaningless-to-malware-developers\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/HazmatFT.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3SN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14929"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=14929"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14929\/revisions"}],"predecessor-version":[{"id":97979,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14929\/revisions\/97979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14945"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=14929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=14929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=14929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}