{"id":32272,"date":"2014-10-02T16:31:08","date_gmt":"2014-10-02T23:31:08","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=32272"},"modified":"2015-02-03T13:47:18","modified_gmt":"2015-02-03T21:47:18","slug":"iworm-botnet-uses-reddit-as-command-and-control-center","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/","title":{"rendered":"iWorm Botnet Uses Reddit as Command and Control Center"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-13985 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header.jpg\" alt=\"infected-laptop-blog-header\" width=\"600\" height=\"350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header-150x87.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header-300x175.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to operate. The malware has infected about 18,500 Macs, according to recent statistical <a title=\"The Mac.BackDoor.iWorm threat in detail\" href=\"http:\/\/news.drweb.com\/show\/?i=5977&amp;c=5&amp;lng=en&amp;p=0\" target=\"_blank\">analysis<\/a>.<\/p>\n<p>The Mac malware, called iWorm, uses a complex multi-purpose backdoor, through which criminals can issue commands that get the malicious program to carry out a wide range of instructions on the infected Macs.<\/p>\n<p>According to researchers, the backdoor makes extensive use of encryption in its routes. It is capable of discovering what other software is installed on the infected machine and sending out information about it (operating system), opening a port on it, downloading additional files, relaying traffic, and sending a query to a web server to acquire the addresses of the C&amp;C servers, essentially turning your Mac into a zombie.<\/p>\n<h3>Installing iWorm<\/h3>\n<p>During installation, the malware first installs a backdoor into the directory \/Library\/Application Support\/JavaW, after which the dropper generates a p-list file, so that the backdoor is launched automatically. Furthermore, it disguises itself as the application com.JavaW and sets itself to autostart via \/Library\/LaunchDaemons\/.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/javaw-inspection\/\" rel=\"attachment wp-att-32359\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32359\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-inspection.png\" alt=\"com.JavaW\" width=\"498\" height=\"224\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-inspection.png 498w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-inspection-150x67.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-inspection-300x134.png 300w\" sizes=\"(max-width: 498px) 100vw, 498px\" \/><\/a><\/p>\n<p>Analysis indicates that the malware begins to seed itself into your Mac upon initial launch, saving its configuration data in a separate file and attempts to read the contents of the \/Library directory to determine which of the installed applications the malware won\u2019t be interacting with. If the bot cannot find \u2018unwanted\u2019 directories, according to reports, it uses system queries to determine the home directory of the Mac OS X account under which it is running, checks the availability of its configuration file in the directory, and writes the data needed for it to continue to operate into the file.<\/p>\n<h3>How Reddit.com played its part<\/h3>\n<p>Many types of malware use command and control servers that they connect to, in order to get instructions from the creators of the malware. The problem with using these servers is that their IP addresses are specified in the malware code, and the servers can generally be taken down.<\/p>\n<p>What\u2019s particularly interesting about iWorm is that\u00a0the botnet uses a novel technique to operate: it uses reddit.com. Infected Macs receive commands from servers under the control of cybercriminals, using information posted in messages on Reddit in order to acquire a control server address list:<\/p>\n<blockquote><p>Then Mac.BackDoor.iWorm opens a port on an infected computer and awaits an incoming connection. It sends a request to a remote site to acquire a list of control servers, and then connects to the remote servers and waits for instructions.<\/p>\n<p>Interestingly, in order to acquire a control server address list, the bot uses the search service at reddit.com. It sends a search query that specifies hexadecimal values of the first 8 bytes of the MD5 hash of the current date. The reddit.com search returns a web page containing a list of botnet C&amp;C servers and ports published by criminals in comments to the post minecraftserverlists under the account vtnhiaovyd.<\/p><\/blockquote>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/mac-malware-botnet-reddit\/\" rel=\"attachment wp-att-32281\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-32281\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/mac-malware-botnet-reddit.png\" alt=\"iWork Malware uses Reddit.com\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/mac-malware-botnet-reddit.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/mac-malware-botnet-reddit-150x90.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/mac-malware-botnet-reddit-300x180.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>The bot picks a random server from the 29 addresses on the list and sends queries to each of them. Search requests to acquire the list are sent to reddit.com in 5-minute intervals, according to Dr. Web\u2019s <a title=\"New Mac OS X botnet discovered\" href=\"http:\/\/news.drweb.com\/show\/?i=5976&amp;lng=en&amp;c=14\" target=\"_blank\">report<\/a>.<\/p>\n<blockquote><p>While establishing a connection to the server whose address is picked from the list using a special routine, the backdoor attempts to determine whether the server address is on the exceptions list and engages in a data exchange with the server to employ special routines for authenticating the remote host. If successful, the backdoor sends the server information about the open port on the infected machine and its unique ID and awaits directives.<\/p><\/blockquote>\n<p>It\u2019s important to note that Reddit is not directly at fault, and it appears that reddit.com\/r\/minecraftserverlists has been shut down. (Intego malware researchers are unable to get persistent files on their systems due to the page being shut down.) If that is the only source criminals are using for the C&amp;C, then they\u2019re dead in the water.<\/p>\n<p>However, as <a title=\"17,000 Macs recruited into malware botnet, with a little help from Reddit\" href=\"http:\/\/grahamcluley.com\/2014\/10\/mac-malware-botnet-reddit\/\" target=\"_blank\">Graham Cluley noted on his blog<\/a>, there is nothing to stop the hackers from using an alternative service, such as Twitter, to communicate with the Mac botnet. Graham\u00a0wrote:<\/p>\n<blockquote><p>And it\u2019s important to stress that Reddit isn\u2019t spreading the infection \u2013 it\u2019s simply providing a platform that is helping the botmasters communicate with the Mac computers they have managed to infect.<\/p><\/blockquote>\n<p>Information collected by Doctor Web\u2019s researchers shows that most of the infected Macs\u20144,610, representing 26.1% of the botnet\u2014reside in the United States. Canada ranks second, and the United Kingdom ranks third in terms of infected Macs.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/iworm-botnet\/\" rel=\"attachment wp-att-32284\"><img loading=\"lazy\" class=\"aligncenter wp-image-32284\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/iworm-botnet.png\" alt=\"iWorm global infection\" width=\"500\" height=\"287\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/iworm-botnet.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/iworm-botnet-150x86.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/iworm-botnet-300x172.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/iworm-botnet-657x377.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h3>How to check if you are infected<\/h3>\n<p>According to research, the iWorm botnet installs itself to the following two locations:<\/p>\n<pre>\/Library\/Application Support\/JavaW\r\n\/Library\/LaunchDaemons<\/pre>\n<p>To check to see if you are infected, open the Finder window and select the Go menu, and then choose \u201cGo to Folder.\u201d<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-32290 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Go-to-Folder-230x300.png\" alt=\"Go to Folder\" width=\"230\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Go-to-Folder-230x300.png 230w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Go-to-Folder-115x150.png 115w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Go-to-Folder.png 301w\" sizes=\"(max-width: 230px) 100vw, 230px\" \/><\/p>\n<p>Copy and past the following into the window that opens:<\/p>\n<p style=\"padding-left: 60px;\"><strong>\/Library\/Application Support\/JavaW<\/strong><\/p>\n<p>Then, click the Go button. If the window displays the message, \u201cThe folder can\u2019t be found,\u201d in the bottom left corner, then you should be safe.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/javaw-folder\/\" rel=\"attachment wp-att-32293\"><img loading=\"lazy\" class=\"aligncenter wp-image-32293\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-folder.png\" alt=\"go to JavaW folder\" width=\"400\" height=\"124\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-folder.png 446w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-folder-150x46.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/JavaW-folder-300x92.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>However, as mentioned by Thomas Reed over at <a title=\"Dr. Web announces new \u201ciWorm\u201d malware\" href=\"http:\/\/www.thesafemac.com\/dr-web-announces-new-iworm-malware\/\" target=\"_blank\">The Safe Mac<\/a>, if a Finder window opens showing the contents of this folder, then you are infected.<\/p>\n<h3>Stay a step ahead<\/h3>\n<p>If after running the test above you find that you are not infected, you can take precautionary steps that enable you to receive a pop-up alert if a new item gets added to any of the locations that the iWorm malware installs itself to.<\/p>\n<p>To do so, open the Finder, choose Go to Folder from the Go menu, and then copy and paste the following path into the window that pops up:<\/p>\n<p style=\"padding-left: 60px;\"><strong>\/Library\/LaunchDaemons<\/strong><\/p>\n<p>Then, click the Go button.<\/p>\n<p>You will be taken to the LaunchDaemons folder; right-click on the folder, and choose Folder Actions Setup.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-32296 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Folder-Actions-Setup-235x300.png\" alt=\"Folder Actions Setup\" width=\"235\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Folder-Actions-Setup-235x300.png 235w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Folder-Actions-Setup-117x150.png 117w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Folder-Actions-Setup.png 271w\" sizes=\"(max-width: 235px) 100vw, 235px\" \/><\/p>\n<p>Choose the script \u201cadd \u2013 new item alert.scpt\u201d and click the Attach button.<\/p>\n<p>Then, select the checkbox to Enable Folder Actions.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/enable-folder-actions\/\" rel=\"attachment wp-att-32347\"><img loading=\"lazy\" class=\"aligncenter wp-image-32347\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Enable-Folder-Actions.png\" alt=\"Enable Folder Actions\" width=\"500\" height=\"413\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Enable-Folder-Actions.png 575w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Enable-Folder-Actions-150x123.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Enable-Folder-Actions-300x247.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>If possible, repeat these steps for \/Library\/Application Support\/JavaW.<\/p>\n<p>Now, if a new item gets added to any of these locations, you will get a pop-up alert. Note that when adding alerts to <span style=\"color: #000000;\">the folders, not every file added\u00a0is an indication of iWorm or malware in general. You need\u00a0to inspect the file and see if there&#8217;s any references to JavaW.\u00a0<\/span><\/p>\n<p>If after inspecting the file you come to find a reference to JavaW, take immediate measures to eradicate the malware.<\/p>\n<h3>How to eradicate iWorm malware<\/h3>\n<p>As the Mac security threat landscape evolves, it\u2019s ever so important to protect your computer using a layered approach to security. Yes, Macs get malware, so you should invest in <strong><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac anti-virus<\/a><\/strong> software to protect your computer. In fact, it\u2019s a good idea to get anti-virus and a firewall, as a layered defense will protect you much more effectively than any one layer by itself.<\/p>\n<p><a title=\"Mac Antivirus and Security\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0with up-to-date virus definitions detects and eradicates this\u00a0malware, which it identifies as <strong>OSX\/iWorm<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to operate. The malware has infected about 18,500 Macs, according to recent statistical analysis. The Mac malware, called iWorm, uses a complex multi-purpose backdoor, through which criminals can issue [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13987,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[30,505,1492,174,80,1498,86,1495,1501],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iWorm Botnet Uses Reddit as Command and Control Center - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-02T23:31:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-03T21:47:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\",\"name\":\"iWorm Botnet Uses Reddit as Command and Control Center - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#primaryimage\"},\"datePublished\":\"2014-10-02T23:31:08+00:00\",\"dateModified\":\"2015-02-03T21:47:18+00:00\",\"description\":\"A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\\u00a0Mac OS X\\u00a0computers and using a novel technique to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iWorm Botnet Uses Reddit as Command and Control Center\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"iWorm Botnet Uses Reddit as Command and Control Center\",\"datePublished\":\"2014-10-02T23:31:08+00:00\",\"dateModified\":\"2015-02-03T21:47:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#webpage\"},\"wordCount\":1200,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\",\"keywords\":[\"Backdoor\",\"Botnet\",\"iWorm\",\"Mac\",\"Mac OS X\",\"Mac.BackDoor.iWorm\",\"Malware\",\"OSX\/iWorm\",\"Reddit\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/","og_locale":"en_US","og_type":"article","og_title":"iWorm Botnet Uses Reddit as Command and Control Center - The Mac Security Blog","og_description":"A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-10-02T23:31:08+00:00","article_modified_time":"2015-02-03T21:47:18+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/","name":"iWorm Botnet Uses Reddit as Command and Control Center - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#primaryimage"},"datePublished":"2014-10-02T23:31:08+00:00","dateModified":"2015-02-03T21:47:18+00:00","description":"A new day, and a new threat to Mac OS X. Virus hunters have discovered a sophisticated botnet targeting\u00a0Mac OS X\u00a0computers and using a novel technique to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iWorm Botnet Uses Reddit as Command and Control Center"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"iWorm Botnet Uses Reddit as Command and Control Center","datePublished":"2014-10-02T23:31:08+00:00","dateModified":"2015-02-03T21:47:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#webpage"},"wordCount":1200,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","keywords":["Backdoor","Botnet","iWorm","Mac","Mac OS X","Mac.BackDoor.iWorm","Malware","OSX\/iWorm","Reddit"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8ow","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32272"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=32272"}],"version-history":[{"count":33,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32272\/revisions"}],"predecessor-version":[{"id":32392,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/32272\/revisions\/32392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/13987"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=32272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=32272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=32272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}