{"id":33550,"date":"2014-11-06T15:07:14","date_gmt":"2014-11-06T23:07:14","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=33550"},"modified":"2016-02-12T10:47:51","modified_gmt":"2016-02-12T18:47:51","slug":"wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/","title":{"rendered":"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/lightning-connector-for-iphone-5-2\/\" rel=\"attachment wp-att-33619\"><img loading=\"lazy\" class=\"aligncenter wp-image-33619 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Malware.jpg\" alt=\"WireLurker malware vector lightning connector for iPhone \" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Malware.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Malware-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Malware-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There. Somebody had to say it.<\/p>\n<p>For a while now, people have felt a sense of security because they\u2019re on an operating system that doesn\u2019t inspire hundreds of thousands of new malware attacks per day. But the total number of malicious threats\u00a0crawling around the Internet waiting to infect your Mac is less important than this simple fact: It only takes one to ruin your day.<\/p>\n<p>Virus hunters have uncovered a new family of Mac malware, called \u201cWireLurker,\u201d which they say has infected hundreds of thousands of Apple devices already.<\/p>\n<p>WireLurker malware affects Apple devices and attacks\u00a0iOS devices as well\u2014and here\u2019s the kicker: This is the first malware that can infect iPhones that have not been jailbroken.<\/p>\n<p>Before we go any further, let&#8217;s cut to the chase: No, you aren&#8217;t at risk of infecting your Mac or iOS device with this current malware\u2014unless you do some really risky\u00a0things (see &#8220;What Apple users do to get infected by WireLurker&#8221; section below). This malware depends on you personally bypassing a whole bunch of built-in security contained in both Macs and iOS devices. In some ways this is akin to\u00a0having 15 deadbolts on the front door of your house yet\u00a0leaving the door wide open when you leave for work.<\/p>\n<h3>How\u00a0WireLurker attacks non-jailbroken iPhones<\/h3>\n<p>WireLurker can install third-party applications on non-jailbroken iPhones and can attack iOS devices through Mac OS X computers by way of USB connections or USB cables, <a title=\"WireLurker: A New Era in OS X and iOS Malware\" href=\"http:\/\/researchcenter.paloaltonetworks.com\/2014\/11\/wirelurker-new-era-os-x-ios-malware\/\" target=\"_blank\">according to security researchers<\/a> at Palo Alto Networks:<\/p>\n<blockquote><p>\u201cWireLurker was used to trojanize 467 OS X applications on the Maiyadi App Store, a third-party Mac application store in China. In the past six months, these 467 infected applications were downloaded over 356,104 times and may have impacted hundreds of thousands of users.\u201d<\/p><\/blockquote>\n<div id=\"attachment_33580\" style=\"width: 605px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-33580\" loading=\"lazy\" class=\"wp-image-33580 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infected-applications-downloads.png\" alt=\"WireLurker infected application number of downloads\" width=\"595\" height=\"272\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infected-applications-downloads.png 595w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infected-applications-downloads-150x68.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infected-applications-downloads-300x137.png 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><p id=\"caption-attachment-33580\" class=\"wp-caption-text\">Image credit: Palo Alto Networks<\/p><\/div>\n<p>Once computers are infected, WireLurker spreads to non-jailbroken iOS devices that connect to the Mac over USB, rewriting existing programs on the device through binary file replacement. The malware uses a popular library called libimobiledevice to interact with iOS devices through USB connections. &#8220;This third-party open source software library implements the iTunes protocol stack for communication between a computer and iOS device,&#8221; according to the researchers white paper.<\/p>\n<blockquote class=\"twitter-tweet\" width=\"500\">\n<p>Everything I&#39;ve read so far in the WireLurker white paper seems not only completely plausible, but easy to pull off with libimobiledevice.<\/p>\n<p>&mdash; Jonathan Zdziarski (@JZdziarski) <a href=\"https:\/\/twitter.com\/JZdziarski\/status\/530159800873533441\">November 6, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Is WireLurker malware a high-risk threat?<\/h3>\n<p>While the malware has been in the wild for the better part of the last half-year and is only gaining attention now, reports have made the threat sound particularly scary.\u00a0But are you at risk of infection?<\/p>\n<p>Apple reported this morning that they have effectively blocked the infected applications targeting users in China.<\/p>\n<blockquote><p>&#8220;We are aware of malicious software available from a download site aimed at users in China, and we&#8217;ve blocked the identified apps to prevent them from launching,&#8221; Apple <a title=\"Apple blocks malware targeting products in China\" href=\"http:\/\/www.reuters.com\/article\/2014\/11\/06\/us-apple-malware-idUSKBN0IQ1S520141106\" target=\"_blank\">said<\/a> in an email to Reuters.<\/p><\/blockquote>\n<p>Without more details, what this likely means is that Apple has stopped accepting that specific unsigned, untrusted certificate. It&#8217;s a simple thing for them to do, and they probably don&#8217;t even have to roll out an OS X update to do it.<\/p>\n<p>The next time an infected iPhone checks in, that certificate gets added to the list of blocked certificates. This is part of Apple&#8217;s standard process to avoid companies from selling and distributing apps outside the App Store. By turning off the certificate, that specific problem goes away.<\/p>\n<p>That being said, the developer of WireLurker malware can probably create another, but they will need an enterprise account to do so, which takes a few more jumps, and the enterprise account that created the previous certificate has probably been disabled as well. Our conclusion is that Apple plugged this\u00a0particular exploit, but it&#8217;s doubtful that they closed the hole. It&#8217;s very likely that Apple is working on closing the hole with whatever security update comes out next.<\/p>\n<h3>How can you know if your Mac\/iPhone is infected?<\/h3>\n<p>While the payload for WireLurker appears to have changed several times so far, you\u00a0can search for the following files\/directories on your Mac to determine whether or not you\u00a0may be infected:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/wirelurker-infection\/\" rel=\"attachment wp-att-33610\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33610\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infection.png\" alt=\"WireLurker infection check\" width=\"585\" height=\"314\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infection.png 585w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infection-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/wirelurker-infection-300x161.png 300w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"color: #000000;\">\/Library\/LaunchDaemons\/com.apple.globalupdate.plist<\/li>\n<li style=\"color: #000000;\">\/Library\/LaunchDaemons\/com.apple.machook_damon.plist<\/li>\n<li style=\"color: #000000;\">\/usr\/bin\/globalupdate<\/li>\n<li style=\"color: #000000;\">\/usr\/local\/machook \u00a0(This directory is created by the malware and may possibly contain copies of the files that were copied to the other above directories.)<\/li>\n<\/ul>\n<p>So a good question at this point is what can you do if you&#8217;re infected?<\/p>\n<p>After analyzing the malware, following is our guide explaining what actions Apple users must take in order to get infected, and what to do if WireLurker infects your computer.<\/p>\n<h3>What\u00a0Apple users do to\u00a0get infected by WireLurker<\/h3>\n<p>Fortunately, unless you do some very risky\u00a0things, WireLurker is a low risk threat and there isn\u2019t much to worry about. So what are the risky\u00a0things you have to do?<\/p>\n<p><strong>Step 1:<\/strong> Download an installer containing the trojan from the Malyadi App Store, a third-party Mac application store in China. While there have been hundreds of files infected at the\u00a0Maiyadi App Store that have been downloaded hundreds of thousands of times, all of the files have turned out to be pirated copies of other apps.<\/p>\n<p><span style=\"text-decoration: underline;\">Prevention Step 1<\/span>: We cannot stress enough the dangers of installing pirated software and\u00a0apps\u2014WireLurker infections are the consequences of risky behavior. Your best method to prevent infection is to not download pirated apps from App stores located in other parts of the world, especially from countries dealing with a high volume of malware.<\/p>\n<p><strong>Step 2<\/strong>: Launch the infected installer\/application you downloaded from the Malyadi App Store.<\/p>\n<p><span style=\"text-decoration: underline;\">Prevention Step 2<\/span>: Go to <strong>System Preferences<\/strong> &gt; <strong>Security &amp; Privacy <\/strong>(General tab). Make sure &#8220;Allow applications downloaded from:&#8221; is set to &#8220;Mac App Store&#8221; or &#8220;Mac App Store and identified developers.&#8221; None of the infected files pass either of these steps, so Mac OS X won&#8217;t let you run them without explicitly bypassing this security measure, something you should never do.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/wirelurking-prevention\/\" rel=\"attachment wp-att-33568\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33568\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurking-Prevention.png\" alt=\"Protection tips for WireLurker malware\" width=\"667\" height=\"540\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurking-Prevention.png 667w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurking-Prevention-150x121.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurking-Prevention-300x242.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurking-Prevention-657x531.png 657w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/a><\/p>\n<p><strong>Step 3<\/strong>: Attach your iOS device to the infected Mac via the USB to Lightning connector (or the older USB to Apple 30 Pin connector). Unlock your iPhone, and set it to trust this new computer.<\/p>\n<p><span style=\"text-decoration: underline;\">Prevention Step 3<\/span>: Don&#8217;t connect your iOS device to a computer via USB that you bypassed step 2 on.<\/p>\n<p>At this point, the iOS device can be mounted on the Mac, and any malware that is running on the Mac has access to certain files on your iOS device. If in step 2 you entered your Administrator Username &amp; Password giving the WireLurker root access, then the malware has even more access to files on your iOS device. And if you do development and your iOS device is paired to the computer in development mode, the computer has even more access.<\/p>\n<p>Now this is where WireLurker starts to get interesting. If the malware is running on a Mac that you use iTunes to sync to the iOS device with, and apps that you have on your iPhone are also on your computer, WireLurker will modify the application stored on the Mac and try to send the app back to the iOS device.<\/p>\n<p>At this point, however, the malware infected\u00a0application is still useless since its signature no longer matches the signature download from the Mac App Store, so there is no way to run the app on your iOS device.<\/p>\n<p><strong>Step 4<\/strong>: On your iOS device, accept the install of the unsigned (hence unknown) provisioning profile. The only way WireLurker can run on your iOS device is to accept this profile.<\/p>\n<div id=\"attachment_33592\" style=\"width: 592px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-33592\" loading=\"lazy\" class=\"size-full wp-image-33592\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-iOS-confirmation-dialog-enterprise-provisioning.png\" alt=\"WireLurker iOS confirmation dialog and subsequent enterprise provisioning\" width=\"582\" height=\"519\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-iOS-confirmation-dialog-enterprise-provisioning.png 582w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-iOS-confirmation-dialog-enterprise-provisioning-150x133.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-iOS-confirmation-dialog-enterprise-provisioning-300x267.png 300w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><p id=\"caption-attachment-33592\" class=\"wp-caption-text\">Image credit: Palo Alto Networks<\/p><\/div>\n<p><span style=\"text-decoration: underline;\">Prevention Step 4<\/span>: There\u2019s a simple way to prevent this: Don\u2019t accept random provisioning profiles that show up on your iDevice for no apparent reason. Any questions?<\/p>\n<p>Now, assuming you have been putting yourself at greater risk of infection through step 4, the only data WireLurker has access to at the moment is data stored within the infected application. In other words, if Pages is infected, it has access only to the Pages data. It\u2019s impossible for the malware to get beyond the app sandbox without doing another risky\u00a0thing, which we explain in step 5.<\/p>\n<p><strong>Step 5<\/strong>: Allow the infected application to have access to your Camera, Contacts, Location, and other areas is dangerous. If all of a sudden an application you have been using for a while starts asking to access all sorts of information that it doesn&#8217;t need\u2014or even requesting for information it used to have access to, but now seemingly doesn&#8217;t (because the infected app is actually not the same one you\u2019ve used for a while, it wants you to re-grant all previous permissions that the real app has)\u2014it should signal red flags with you.<\/p>\n<p><span style=\"text-decoration: underline;\">Prevention Step 5<\/span>: If an app starts popping up a whole bunch of requests that you&#8217;ve either seen before or don&#8217;t understand why the app needs the information, <strong>stop<\/strong>. Ask yourself if something has changed recently (like a major iOS update). If not, go into your iPhone <strong>Settings<\/strong> &gt; <strong>Privacy<\/strong> and check if the app that you think you\u2019re running already has the access it&#8217;s asking for. If it does, something is wrong; queue the red flags. If it doesn&#8217;t, then, well, something may have changed and if you want the app to have access go ahead and allow it.<\/p>\n<p>Again, at this point, the WireLurker malware is limited to access data in the app, and in your Address Book and Camera Roll. Plus, the application can also access your current location.<\/p>\n<p><strong>Step 6:<\/strong> If you&#8217;re still with us here, and none of the red flags have set off for you so far, you can use the new to iOS 8 extensions mechanism, or iCloud Drive, and from within the app, find and open a file other then the files inside the app itself. The malware now has access to that document as well (and only that document).<\/p>\n<p><span style=\"text-decoration: underline;\">Prevention Step 6<\/span>: If there are red flags going off in your head, don&#8217;t use an application to open documents that the app wouldn&#8217;t otherwise have access to.<\/p>\n<p>For those who are engaging in risky online behavior, it is important to note that even though you have gotten this far\u2014installing and running the malware on your iOS device, thus getting infected with WireLurker\u2014the malware still only has access to data that the real app would have access to. Apple\u2019s sandboxing that makes iOS so secure in the first place is still fully intact. The only reason you have malware running on your iOS device is because you\u2019ve gone out of your way to help the malware get there.<\/p>\n<p>Now, unfortunately once the malware is there, there is no way for any app (like <a title=\"VirusBarrier iOS\" href=\"https:\/\/www.intego.com\/mac-virus-barrier-ios\" target=\"_blank\">VirusBarrier iOS<\/a>) to scan and find the malware, because the same sandboxing that is preventing the malware from spreading or doing any real damage also prevents third parties from scanning the iOS device to look for malware.<\/p>\n<p>So, if you\u2019re infected, what can you do to undo the mess you\u2019ve created?<\/p>\n<h3>How to mitigate the WireLurker threat<\/h3>\n<p>Metaphorically, you should just stop leaving your front door open and start using the deadbolts. In a more straightforward approach, there are four steps you can take to mitigate the WireLurker threat, and they are as follows:<\/p>\n<ol>\n<li>On your iPhone, go into <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Profiles<\/strong>. If you see something there that shouldn&#8217;t be there, remove it. Once the profile is removed, the malware can&#8217;t run on your iOS device anymore. Note that some enterprises actually install real signed profiles there, so just because you see a profile there, it isn&#8217;t necessarily a bad thing. But if you see a profile there with red text in it, beware.<\/li>\n<li>Any apps that no longer launch on your iOS device, delete. Then re-download them directly from the App Store on your device. This deletes the bad code.<\/li>\n<li>Scan your Mac for potential viruses and malware using robust <strong><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac anti-virus<\/a>\u00a0<\/strong>software like Intego VirusBarrier. This will eradicate\u00a0the malware from the Mac and prevent further re-infection of your iOS device.<\/li>\n<li>Don&#8217;t attach your iOS device via a USB cable to a computer that you perform risky behavior on. An infected computer (Mac OS X or Windows) that you attach an iOS device to via USB can get access to data on that device. Of course, the data has probably already been compromised as the malware on your computer has access to pretty much everything on your computer, but that&#8217;s another issue. Simply don&#8217;t practice unprotected syncing.<\/li>\n<\/ol>\n<p>So there you have it.\u00a0A step by\u00a0step guide showing how to give yourself a nasty case of the WireLurker malware, and what to do if you were risky enough to get infected.<\/p>\n<p><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0with up-to-date virus definitions detects this Mac and iOS malware as <strong>OSX\/WireLurker<\/strong> and <strong>iOS\/WireLurker<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There. Somebody had to say it. For a while now, people have felt a sense of security because they\u2019re on an operating system that doesn\u2019t inspire hundreds of thousands [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":33616,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[3151,69,1639,9,174,86,1636,1633],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-06T23:07:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:47:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\",\"name\":\"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#primaryimage\"},\"datePublished\":\"2014-11-06T23:07:14+00:00\",\"dateModified\":\"2016-02-12T18:47:51+00:00\",\"description\":\"The handwriting is on the wall and it\\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones\",\"datePublished\":\"2014-11-06T23:07:14+00:00\",\"dateModified\":\"2016-02-12T18:47:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#webpage\"},\"wordCount\":2178,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg\",\"keywords\":[\"Apple\",\"iOS\",\"iOS\/WireLurker\",\"iPhone\",\"Mac\",\"Malware\",\"OSX\/WireLurker\",\"WireLurker\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/","og_locale":"en_US","og_type":"article","og_title":"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones - The Mac Security Blog","og_description":"The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-11-06T23:07:14+00:00","article_modified_time":"2016-02-12T18:47:51+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/","name":"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#primaryimage"},"datePublished":"2014-11-06T23:07:14+00:00","dateModified":"2016-02-12T18:47:51+00:00","description":"The handwriting is on the wall and it\u2019s been there for many years now. Apple devices and Macs can get malware, just like any other machine. There.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones","datePublished":"2014-11-06T23:07:14+00:00","dateModified":"2016-02-12T18:47:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#webpage"},"wordCount":2178,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg","keywords":["Apple","iOS","iOS\/WireLurker","iPhone","Mac","Malware","OSX\/WireLurker","WireLurker"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/WireLurker-Mac-iOS-Malware.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8J8","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33550"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=33550"}],"version-history":[{"count":29,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33550\/revisions"}],"predecessor-version":[{"id":33658,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33550\/revisions\/33658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/33616"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=33550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=33550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=33550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}