{"id":33103,"date":"2014-10-23T13:45:41","date_gmt":"2014-10-23T20:45:41","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=33103"},"modified":"2016-02-12T10:47:31","modified_gmt":"2016-02-12T18:47:31","slug":"ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/","title":{"rendered":"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/ventir-trojan-mac-malware\/\" rel=\"attachment wp-att-33181\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33181\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware.jpg\" alt=\"Ventir Trojan malware on a Mac\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many security experts concerned. Virus hunters have unveiled yet another modular malware for Mac OS X, called the Ventir Trojan.<\/p>\n<p>Ventir uses a dropper program (e.g. Trojan horse) that can leave a backdoor, a keylogger and other malicious files behind on an infected Mac. These can be used for spying and stealing information from the victim\u2019s Mac.<\/p>\n<p>We currently do not know how the malware is distributed. Ventir is a Trojan horse, so it\u2019s likely being picked up when downloading pirated software from peer-to-peer websites, such as BitTorrent.<\/p>\n<p>The primary feature of Ventir is that it integrates a legitimate component for intercepting keystrokes that is freely available on code sharing websites.<\/p>\n<h3>Infection Vector<\/h3>\n<p>The keystroke logger makes use of an open source software package freely available from GitHub, called LogKext. Given the recent scares about hacked accounts, the thought of software that watches what you type and sends it to the bad guys is particularly unnerving.<\/p>\n<p>LogKext has three files that function to intercept keystrokes (<strong>updated.kext<\/strong>), match the codes of the keys pressed by the victim to the characters associated with these codes (<strong>Keymap.plist<\/strong>), and log the keystrokes along with some system events (<strong>EventMonitor agent<\/strong>).<\/p>\n<p>Fortunately, LogKext hooks on to the OS X kernel only if the dropper is successful in obtaining elevated privilges to the victims Mac.<\/p>\n<p>It\u2019s also worth noting that some of the keylogger components (Keymap.plist and updated.kext) are previously detected by <a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a> as <strong>OSX\/logKext.E<\/strong> and <strong>OSX\/logKext.D<\/strong>.<\/p>\n<h3>How it installs on Mac OS X computers<\/h3>\n<p>The Ventir Tojan is delivered through a dropper that, when launched, checks whether it has root access to the machine\u2014this is critical because that affects where the malware can install itself.<\/p>\n<p>The result of the check for root access determines how much Ventir can run and the path where the Trojan\u2019s files will be installed on the victims Mac.<\/p>\n<p><strong>Where Ventir installs files<\/strong><\/p>\n<p>It\u2019s important to distinguish the two install directories: <strong>\/Library\/.local<\/strong> and <strong>~\/Library\/.local<\/strong> (\u201c~\u201d stands for the path to the current user\u2019s home directory). The malware will install to the home\u00a0directory if the installer does not have root access.<\/p>\n<p><strong>With root access<\/strong><\/p>\n<p>If it has root access, the Trojan\u2019s files will be installed in \/Library\/.local and \/Library\/LaunchDaemons. The Ventir malware downloads additional backdoor components if it has full privileges to the victims Mac.<\/p>\n<p><strong>Without root access<\/strong><\/p>\n<p>If it does not have root access, the files will be installed in ~\/Library\/.local and ~\/Library\/LaunchAgents. The EventMonitor spying component is downloaded to the affected machine only if elevated privileges are not obtained.<\/p>\n<p>\u201cAll files of the Trojan to be downloaded to the victim machine are initially located in the \u2018__data\u2019 section of the dropper file,\u201d <a title=\"The Ventir Trojan: assemble your MacOS spy\" href=\"http:\/\/securelist.com\/blog\/research\/67267\/the-ventir-trojan-assemble-your-macos-spy\/\" target=\"_blank\">wrote<\/a> Mikhail Kuzin over at Securelist.<\/p>\n<div id=\"attachment_33178\" style=\"width: 919px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-33178\" loading=\"lazy\" class=\"wp-image-33178 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-trojan-files.jpg\" alt=\"Ventir trojan files\" width=\"909\" height=\"298\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-trojan-files.jpg 909w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-trojan-files-150x49.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-trojan-files-300x98.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-trojan-files-657x215.jpg 657w\" sizes=\"(max-width: 909px) 100vw, 909px\" \/><p id=\"caption-attachment-33178\" class=\"wp-caption-text\">Image credit: Securelist<\/p><\/div>\n<p>After the dropper determines where the Trojan\u2019s files will be installed, it hides the following files on the infected machine:<\/p>\n<ol>\n<li>Library\/.local\/updated \u2013 re-launches files update and EventMonitor in the event of unexpected termination.<\/li>\n<li>Library\/.local\/reweb \u2013 used to re-launch the file updated.<\/li>\n<li>Library\/.local\/update \u2013 the backdoor module.<\/li>\n<li>Library\/.local\/libweb.db \u2013 the malicious program&#8217;s database file. Initially contains the Trojan&#8217;s global settings, such as the C&amp;C address.<\/li>\n<li>Library\/LaunchAgents <em>(or LaunchDaemons)<\/em>\/com.updated.launchagent.plist \u2013 the properties file used to set the file Library\/.local\/updated to autorun using the launchd daemon.<\/li>\n<li>Depending on whether root access is available:\n<ul>\n<li><strong>A)<\/strong> If it is \u2013 \/Library\/.local\/kext.tar. The following files are extracted from the archive:\n<ul>\n<li>updated.kext \u2013 the driver that intercepts user keystrokes. This is installed at \/System\/Library\/Extensions\/updated.kext. There is a good chance the user will see a popup for this when it\u2019s installed.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/updated-kext-popup\/\" rel=\"attachment wp-att-33196\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33196\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/updated.kext-popup.png\" alt=\"updated.kext popup\" width=\"414\" height=\"225\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/updated.kext-popup.png 414w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/updated.kext-popup-150x81.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/updated.kext-popup-300x163.png 300w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/a><\/p>\n<ul>\n<ul>\n<ul>\n<li>Keymap.plist \u2013 the map which matches the codes of the keys pressed by the user to the characters associated with these codes. This is installed to \/Library\/.local, and users may see a popup when it\u2019s installed.<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<ul>\n<ul>\n<ul>\n<li>EventMonitor \u2013 the agent which logs keystrokes as well as certain system events to the following file: Library\/.local\/.logfile. This is installed to \/Library\/.local, and users may see a popup when it\u2019s installed.<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<ol>\n<ul>\n<li><strong>B)<\/strong> If it isn&#8217;t \u2013 ~\/Library\/.local\/EventMonitor. This is the agent that logs the current active window name and the keystrokes to the following file: Library\/.local\/.logfile<\/li>\n<\/ul>\n<\/ol>\n<h3>How to check if you are infected<\/h3>\n<p>Checking for and finding the existence of a \/Library\/.local or ~\/Library\/.local directory on your Mac is the most obvious indicator of infection. But first you will need to ensure you have Finder set to show hidden files.<\/p>\n<p>By default, Mac OS X\u2019s Finder keeps system files\u2014which generally start with a dot, like .bash_profile\u2014out of sight. To set Finder to show all hidden files, open Terminal and type the following:<\/p>\n<pre>defaults write com.apple.finder AppleShowAllFiles TRUE<\/pre>\n<pre>killall Finder<\/pre>\n<p>To set it back, simply execute those same commands, but switch TRUE to FALSE.<\/p>\n<p>If the \/Library\/.local directory exists, there may also be a keylogger extension located at <strong>\/System\/Library\/Extensions\/updated.kext<\/strong>.<\/p>\n<p>Also check for the <strong>Agent\/Daemon: com.updated.launchagent.plist<\/strong> in \/Library\/LaunchDaemon\/ or ~\/Library\/LaunchAgents\/. Its contents will reference a program in \/Library\/.local:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/com-updated-launchagent\/\" rel=\"attachment wp-att-33202\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33202\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/com.updated.launchagent.png\" alt=\"com.updated.launchagent\" width=\"344\" height=\"197\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/com.updated.launchagent.png 344w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/com.updated.launchagent-150x85.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/com.updated.launchagent-300x171.png 300w\" sizes=\"(max-width: 344px) 100vw, 344px\" \/><\/a><\/p>\n<h3>Is the Ventir Trojan related to OSX\/Crisis?<\/h3>\n<p>It appears that OSX\/Ventir is similar to <a title=\"New Apple Mac Trojan Called OSX\/Crisis Discovered\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-apple-mac-trojan-called-osxcrisis-discovered-by-intego-virus-team\/\" target=\"_blank\">OSX\/Crisis<\/a>, as researchers have found it has approximately the same number of modules with similar functionality. Unfortunately, using open source software makes it easier for criminals to create new Mac malware, and it\u2019s likely that such attacks will grow more prevalent as it becomes simpler and simpler to use off the shelf components to build malicious software.<strong>\u00a0<\/strong><\/p>\n<h3>How to eradicate Ventir malware<\/h3>\n<p>The Ventir Trojan\u00a0is a great example why a layered defense strategy is so handy. We\u2019ve already covered the need to <a title=\"Should You Back Up Your iOS Device to iCloud or iTunes?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\" target=\"_blank\">back up your data<\/a> in multiple places and establish a good backup routine. But what else can you do?<\/p>\n<ol>\n<li>Create a non-admin account for everyday activities<\/li>\n<li>Use unique, strong passwords<\/li>\n<li>Uninstall Java from your machine<\/li>\n<li>Do not install pirated software from peer-to-peer sites<\/li>\n<li>Pay attention to system warnings when it asks you whether you want to install something<\/li>\n<li>Turn on FileVault full-disk encryption on your Mac<\/li>\n<li>Run \u201cSoftware Update\u201d and patch your Mac promptly when Apple security updates are available<\/li>\n<li>Ensure all third-party software is up-to-date (i.e. Flash Player, web browsers)<\/li>\n<li>Use a web browser that contains a sandbox and has a solid track record of fixing security issues promptly<\/li>\n<li>Install a good Mac security solution (this includes anti-virus and firewall)<\/li>\n<\/ol>\n<p><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac anti-virus<\/a> is meant to detect known-bad things, and as Ventir was previously unknown, odds are it would not have caught this. Firewalls, however, are meant to detect unknown network traffic and would likely have alerted on this. By having layered security on your machine, you increase the chances of being able to prevent incidents like these.<\/p>\n<p><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a> with up-to-date virus definitions detects and eradicates this malware, which it identifies as <strong>OSX\/Ventir<\/strong>. Additionally, some of the keylogger components (Keymap.plist and updated.kext) were already detected by Intego VirusBarrier as OSX\/logKext.E and OSX\/logKext.D.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many security experts concerned. Virus hunters have unveiled yet another modular malware for Mac OS X, called the Ventir Trojan. Ventir uses a dropper program (e.g. Trojan horse) that [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":33187,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[80,86,1591,1588,1594,132,1585],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-23T20:45:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:47:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac malware Trojan horse\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/\",\"name\":\"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#primaryimage\"},\"datePublished\":\"2014-10-23T20:45:41+00:00\",\"dateModified\":\"2016-02-12T18:47:31+00:00\",\"description\":\"Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers\",\"datePublished\":\"2014-10-23T20:45:41+00:00\",\"dateModified\":\"2016-02-12T18:47:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#webpage\"},\"wordCount\":1235,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\",\"keywords\":[\"Mac OS X\",\"Malware\",\"OSX\/logKext.D\",\"OSX\/logKext.E\",\"OSX\/Ventir\",\"Trojan Horse\",\"Ventir\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/","og_locale":"en_US","og_type":"article","og_title":"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers - The Mac Security Blog","og_description":"Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-10-23T20:45:41+00:00","article_modified_time":"2016-02-12T18:47:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","width":400,"height":260,"caption":"Mac malware Trojan horse"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/","name":"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#primaryimage"},"datePublished":"2014-10-23T20:45:41+00:00","dateModified":"2016-02-12T18:47:31+00:00","description":"Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Ventir Trojan Intercepts Keystrokes from Mac OS X Computers","datePublished":"2014-10-23T20:45:41+00:00","dateModified":"2016-02-12T18:47:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#webpage"},"wordCount":1235,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","keywords":["Mac OS X","Malware","OSX\/logKext.D","OSX\/logKext.E","OSX\/Ventir","Trojan Horse","Ventir"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ventir-trojan-intercepts-keystrokes-from-mac-os-x-computers\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8BV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33103"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=33103"}],"version-history":[{"count":21,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33103\/revisions"}],"predecessor-version":[{"id":33226,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33103\/revisions\/33226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/33187"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=33103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=33103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=33103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}