{"id":2649,"date":"2011-05-03T16:07:04","date_gmt":"2011-05-03T23:07:04","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2649"},"modified":"2016-02-12T10:01:40","modified_gmt":"2016-02-12T18:01:40","slug":"crimekit-launched-to-attack-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/","title":{"rendered":"Crimekit Launched to Attack Macs"},"content":{"rendered":"<p>An advanced <a href=\"http:\/\/www.csis.dk\/en\/csis\/blog\/3195\/\">DIY crimeware kit as been announced<\/a>, designed to attack Macs, notably through browser vulnerabilities. For now, this kit is only able to take advantage of one vulnerability on the Firefox web browser, but others will likely follow, notably for Safari and Chrome. This toolkit allows malicious users to create files that they will then inject into hacked web sites. <\/p>\n<p>A number of videos are available showing how it works, and Intego&#8217;s security researchers are currently examining this kit. We cannot speculate on how this will affect Macs, given Mac OS X&#8217;s built-in security features, but Intego is working hard to ensure that its software, notably <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">VirusBarrier X6<\/a>, will provide protection against this type of attack, especially through the program&#8217;s Web Threat protection module. <\/p>\n<div class=\"blog-download\">\n<p class=\"button\"><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download 30-day free trial<\/a><\/p>\n<h4><a href=\"https:\/\/www.intego.com\/demo?blog2\">Protect your Mac from malware<\/a><\/h4>\n<p><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download a free 30-day trial version of VirusBarrier X6 and save $5<\/a><\/p>\n<div class=\"clear\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[33,86,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crimekit Launched to Attack Macs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-05-03T23:07:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:01:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/\",\"name\":\"Crimekit Launched to Attack Macs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2011-05-03T23:07:04+00:00\",\"dateModified\":\"2016-02-12T18:01:40+00:00\",\"description\":\"An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crimekit Launched to Attack Macs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Crimekit Launched to Attack Macs\",\"datePublished\":\"2011-05-03T23:07:04+00:00\",\"dateModified\":\"2016-02-12T18:01:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#webpage\"},\"wordCount\":150,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"keywords\":[\"Browser\",\"Malware\",\"Vulnerability\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/","og_locale":"en_US","og_type":"article","og_title":"Crimekit Launched to Attack Macs - The Mac Security Blog","og_description":"An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-05-03T23:07:04+00:00","article_modified_time":"2016-02-12T18:01:40+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/","name":"Crimekit Launched to Attack Macs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2011-05-03T23:07:04+00:00","dateModified":"2016-02-12T18:01:40+00:00","description":"An advanced DIY crimekit designed to attack Macs is starting to circulate among hackers. This could lead to increased malware attacks targeting Macs.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Crimekit Launched to Attack Macs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Crimekit Launched to Attack Macs","datePublished":"2011-05-03T23:07:04+00:00","dateModified":"2016-02-12T18:01:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#webpage"},"wordCount":150,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"keywords":["Browser","Malware","Vulnerability"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/crimekit-launched-to-attack-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-GJ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2649"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2649"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2649\/revisions"}],"predecessor-version":[{"id":50134,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2649\/revisions\/50134"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}