{"id":15361,"date":"2013-06-25T12:31:53","date_gmt":"2013-06-25T19:31:53","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=15361"},"modified":"2016-10-07T12:20:18","modified_gmt":"2016-10-07T19:20:18","slug":"another-sketchy-genieo-installer-discovered","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/","title":{"rendered":"Another Sketchy Genieo Installer Discovered"},"content":{"rendered":"<p>You may recall, about a month ago Genieo had posted sketchy adware installers that were <a href=\"https:\/\/www.intego.com\/mac-security-blog\/another-problematic-softonic-installer-brings-adware\/\">posing as fake Flash alerts<\/a>. Well, they&#8217;re at it again with a new variant, this time purporting to be video codecs. The behavior once installed is quite similar to the previous variant, but this version has been updated for improved compatibility with OS X 10.8.<\/p>\n<p>Another hat tip to <a href=\"http:\/\/www.thesafemac.com\/malicious-genieo-installers-persist\/\" target=\"_blank\">Thomas Reed<\/a> for pointing out the updated variant. This new variant has slightly different behavior depending on what version of the operating system you&#8217;re running. If you try to install the file on OS X 10.8, it doesn&#8217;t ask for an admin password, as it does not yet have compatibility for its code injection components. If you try to install on 10.6 or 10.7, the installer asks for an admin password and it installs code injection components as in previous variants.<\/p>\n<p>Java is required for Genieo to run, so if you have 10.7 or 10.8 without Java installed, it prompts you to install Java before proceeding.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/JavaGenieo.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-15363\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/JavaGenieo.png\" alt=\"JavaGenieo\" width=\"533\" height=\"187\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/JavaGenieo.png 533w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/JavaGenieo-150x52.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/JavaGenieo-300x105.png 300w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><\/a><\/p>\n<p>This variant also affects the functioning of XProtect. Upon installation, it removes the Apple system quarantine flag so that the user won&#8217;t see a system alert at the first launch of the application.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/AppleQuarantine.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-15365\" style=\"border: 1px solid black;\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/AppleQuarantine.png\" alt=\"AppleQuarantine\" width=\"533\" height=\"64\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/AppleQuarantine.png 533w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/AppleQuarantine-150x18.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/AppleQuarantine-300x36.png 300w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><\/a><\/p>\n<p>As with the previous variant, this version uses a dynamic library to inject into Safari when the browser is launched. This enables it to intercept searches on Google, Bing and Yahoo and silently redirect them to Genieo or its partner engine.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/virusbarrier\">Intego VirusBarrier<\/a> users with up-to-date virus definitions will protect against this threat as <strong>OSX\/Genieo.B<\/strong>. It&#8217;s advised, if you have already installed this file, to use the adware&#8217;s provided uninstaller to remove the files, as removing these files otherwise can result in system inoperability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they&#8217;re at it again with a new variant, this time purporting to be video codecs. The behavior once installed is quite similar to the previous variant, but this version has been updated for improved [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[475,86,2836],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they&#039;re at it again with a new\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Another Sketchy Genieo Installer Discovered - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they&#039;re at it again with a new\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-25T19:31:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T19:20:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/\",\"name\":\"Another Sketchy Genieo Installer Discovered - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#primaryimage\"},\"datePublished\":\"2013-06-25T19:31:53+00:00\",\"dateModified\":\"2016-10-07T19:20:18+00:00\",\"description\":\"You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they're at it again with a new\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Another Sketchy Genieo Installer Discovered\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Another Sketchy Genieo Installer Discovered\",\"datePublished\":\"2013-06-25T19:31:53+00:00\",\"dateModified\":\"2016-10-07T19:20:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#webpage\"},\"wordCount\":288,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"keywords\":[\"Genieo\",\"Malware\",\"OSX\/Genieo.B\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they're at it again with a new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/","og_locale":"en_US","og_type":"article","og_title":"Another Sketchy Genieo Installer Discovered - The Mac Security Blog","og_description":"You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they're at it again with a new","og_url":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-06-25T19:31:53+00:00","article_modified_time":"2016-10-07T19:20:18+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/","name":"Another Sketchy Genieo Installer Discovered - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#primaryimage"},"datePublished":"2013-06-25T19:31:53+00:00","dateModified":"2016-10-07T19:20:18+00:00","description":"You may recall, about a month ago Genieo had posted sketchy adware installers that were posing as fake Flash alerts. Well, they're at it again with a new","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Another Sketchy Genieo Installer Discovered"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Another Sketchy Genieo Installer Discovered","datePublished":"2013-06-25T19:31:53+00:00","dateModified":"2016-10-07T19:20:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#webpage"},"wordCount":288,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","keywords":["Genieo","Malware","OSX\/Genieo.B"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3ZL","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15361"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=15361"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15361\/revisions"}],"predecessor-version":[{"id":51634,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15361\/revisions\/51634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8755"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=15361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=15361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=15361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}