{"id":18595,"date":"2013-09-27T09:51:35","date_gmt":"2013-09-27T16:51:35","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=18595"},"modified":"2016-10-07T12:19:51","modified_gmt":"2016-10-07T19:19:51","slug":"new-cross-platform-backdoor-trojans-used-in-targeted-attack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/","title":{"rendered":"New Cross-Platform Backdoor Trojans Used in Targeted Attack"},"content":{"rendered":"<p>Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac OS X and Windows machines.\u00a0Likely found in pirated software distributed via BitTorrent trackers and other sites containing links to pirated software, these trojans act as backdoors on an affected user&#8217;s system, and are found bundled with copies of legitimate commercial applications.<\/p>\n<p>When the files as shown below are run, each tries to contact a Command and Control (C&amp;C) server to await commands from the attacker.<\/p>\n<p>AppDelete.app.zip<br \/>\nSHA1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 8bbbc10bf35ac5c9ba768462cbf864713ff740fe<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-18601\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/App-Icons-3.png\" alt=\"App-Icons 3\" width=\"148\" height=\"107\" \/><\/p>\n<p>Img2icns.app.zip<br \/>\nSHA1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 14bc618b68e17a1ed79bb786e7d33efe21c03b84<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-18599\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/App-Icons2.png\" alt=\"App-Icons2\" width=\"124\" height=\"100\" \/><\/p>\n<p>CleanMyMac.app.zip<\/p>\n<p>SHA1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 6819dd010b463d30cc94b33547bb4c2d95dd672f<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/App-Icons.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-18597\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/App-Icons.png\" alt=\"App-Icons\" width=\"149\" height=\"101\" \/><\/a><br \/>\nInside each of the application folders we can see the invisible backdoor, .launchd.app, which is copied to the user&#8217;s Home folder and launches when the user double-clicks on the trojan application. It also launches the original commercial applications corresponding to the icon used to entice the target, which are embedded in each of the trojan application&#8217;s resources, disguising its bad activity.<\/p>\n<p>The .launchd.app application has a simple keylogger that communicates with the C&amp;C server. Persistence is achieved by creating a LaunchAgent, which launches the backdoor .launchd.app at every login:<\/p>\n<ul>\n<li>~\/Library\/LaunchAgents\/apple.launchd.plist<\/li>\n<\/ul>\n<p>The backdoor files are removed from the commercial application at the first launch of the backdoor, attempting to hide the trojan&#8217;s trail. Affected users cannot effectively see where the backdoor came from after the first launch.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/contents.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-18605\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/contents.png\" alt=\"contents\" width=\"240\" height=\"289\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/contents.png 240w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/contents-124x150.png 124w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/a><br \/>\nThe Mac variant uses 64 bits code without any code signing, and it is only compatible with OS X versions 10.7 and 10.8.<\/p>\n<p>Similar to\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-trojan-discovered-related-to-syria\/\" target=\"_blank\">OSX\/Leverage<\/a>, this trojan inhibits the Dock icon and Command-Tab application switching when the backdoor is launched, making it more difficult for a user to spot.<\/p>\n<p>The trojan files&#8217; use a copyright, but it&#8217;s poorly written (including a strange character and &#8220;Apple&#8221; being in lower-case), so it is clearly not by the original authors of the valid apps they try to imitate.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/Copyright.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-18603\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/Copyright.png\" alt=\"Copyright\" width=\"299\" height=\"114\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/Copyright.png 299w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/Copyright-150x57.png 150w\" sizes=\"(max-width: 299px) 100vw, 299px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.intego.com\/virusbarrier\" target=\"_blank\">Intego VirusBarrier<\/a> with up-to-date virus definitions protects Mac users against this malware, detected as <strong>OSX\/Icefog.A<\/strong>. While this is known to be affecting users, this is considered to be a low-risk threat at this time, as it appears to be a targeted attack.<\/p>\n<p>____<\/p>\n<p><strong>Update &#8211; September 30, 2013<\/strong><\/p>\n<p>Intego has received several reports from concerned customers who read this post and believe that the valid applications are trojans. It is important to note that the legitimate apps the trojans imitate do not try to surreptitiously install malware. Likely distributed via sites containing links to pirated software,\u00a0the trojan files&#8217; use a copyright that is poorly written and includes an odd character with &#8220;apple&#8221; (sic) being lower-case.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac OS X and Windows machines.\u00a0Likely found in pirated software distributed via BitTorrent trackers and other sites containing links to pirated software, these trojans act as backdoors on an affected user&#8217;s system, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[30,174,86,168,659,132,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Cross-Platform Backdoor Trojans Used in Targeted Attack - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-27T16:51:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T19:19:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/\",\"name\":\"New Cross-Platform Backdoor Trojans Used in Targeted Attack - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#primaryimage\"},\"datePublished\":\"2013-09-27T16:51:35+00:00\",\"dateModified\":\"2016-10-07T19:19:51+00:00\",\"description\":\"Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Cross-Platform Backdoor Trojans Used in Targeted Attack\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"New Cross-Platform Backdoor Trojans Used in Targeted Attack\",\"datePublished\":\"2013-09-27T16:51:35+00:00\",\"dateModified\":\"2016-10-07T19:19:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#webpage\"},\"wordCount\":476,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Backdoor\",\"Mac\",\"Malware\",\"OS X\",\"OSX\/Icefog.A\",\"Trojan Horse\",\"Windows\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/","og_locale":"en_US","og_type":"article","og_title":"New Cross-Platform Backdoor Trojans Used in Targeted Attack - The Mac Security Blog","og_description":"Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-09-27T16:51:35+00:00","article_modified_time":"2016-10-07T19:19:51+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/","name":"New Cross-Platform Backdoor Trojans Used in Targeted Attack - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#primaryimage"},"datePublished":"2013-09-27T16:51:35+00:00","dateModified":"2016-10-07T19:19:51+00:00","description":"Security researchers have discovered three trojan horse applications, now posted to VirusTotal, which appear to be part of a targeted attack for both Mac","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Cross-Platform Backdoor Trojans Used in Targeted Attack"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"New Cross-Platform Backdoor Trojans Used in Targeted Attack","datePublished":"2013-09-27T16:51:35+00:00","dateModified":"2016-10-07T19:19:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#webpage"},"wordCount":476,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Backdoor","Mac","Malware","OS X","OSX\/Icefog.A","Trojan Horse","Windows"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-cross-platform-backdoor-trojans-used-in-targeted-attack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4PV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/18595"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=18595"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/18595\/revisions"}],"predecessor-version":[{"id":58189,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/18595\/revisions\/58189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=18595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=18595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=18595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}