{"id":3716,"date":"2012-03-05T16:19:36","date_gmt":"2012-03-06T00:19:36","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3716"},"modified":"2016-02-12T10:13:01","modified_gmt":"2016-02-12T18:13:01","slug":"flashback-mac-malware-uses-twitter-as-command-and-control-center","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/","title":{"rendered":"Flashback Mac Malware Uses Twitter as Command and Control Center"},"content":{"rendered":"<p>The Flashback malware, which Intego <a href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-trojan-horse-infections-increasing-with-new-variant\/\">pointed out was infecting an increasing number of Macs<\/a>, turns out to be using a novel technique to operate.<!--more--> Many types of malware use command and control servers that they connect to, in order to get instructions from the creators of the malware. The problem with using these servers is that their IP addresses are specified in the malware code, and the servers can generally be taken down.<\/p>\n<p>Flashback, however, uses an interesting method of getting commands: it uses Twitter. And rather than use a specific Twitter account, which can be removed, it queries Twitter for tweets containing specific hashtags. These hashtags aren&#8217;t as simple as, say, #Flashback or #MacMalwareMaster, but are seemingly random strings of characters that change each day. Intego&#8217;s malware research team cracked the 128-bit RC4 encryption used for Flashback&#8217;s code and discovered the keys to this system.<\/p>\n<p>The hashtags are made up of twelve characters. There are four characters for the day, four characters for the month, and four characters for the year. The characters used are in the following table:<\/p>\n<p>&nbsp;<\/p>\n<table class=\"flashback-code\">\n<tbody>\n<tr>\n<td class=\"number-a\">0<\/td>\n<td class=\"code-a\">gbqj<\/td>\n<td class=\"number-b\">18<\/td>\n<td class=\"code-b\">kudd<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">1<\/td>\n<td class=\"code-a\">dljt<\/td>\n<td class=\"number-b\">19<\/td>\n<td class=\"code-b\">nwal<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">2<\/td>\n<td class=\"code-a\">yfad<\/td>\n<td class=\"number-b\">20<\/td>\n<td class=\"code-b\">hmca<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">3<\/td>\n<td class=\"code-a\">kpsh<\/td>\n<td class=\"number-b\">21<\/td>\n<td class=\"code-b\">dqyo<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">4<\/td>\n<td class=\"code-a\">igaw<\/td>\n<td class=\"number-b\">22<\/td>\n<td class=\"code-b\">kkag<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">5<\/td>\n<td class=\"code-a\">pepb<\/td>\n<td class=\"number-b\">23<\/td>\n<td class=\"code-b\">viqt<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">6<\/td>\n<td class=\"code-a\">ezcn<\/td>\n<td class=\"number-b\">24<\/td>\n<td class=\"code-b\">wpld<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">7<\/td>\n<td class=\"code-a\">hwpd<\/td>\n<td class=\"number-b\">25<\/td>\n<td class=\"code-b\">nsiy<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">8<\/td>\n<td class=\"code-a\">drir<\/td>\n<td class=\"number-b\">26<\/td>\n<td class=\"code-b\">myvo<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">9<\/td>\n<td class=\"code-a\">rnwp<\/td>\n<td class=\"number-b\">27<\/td>\n<td class=\"code-b\">rgel<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">10<\/td>\n<td class=\"code-a\">updw<\/td>\n<td class=\"number-b\">28<\/td>\n<td class=\"code-b\">zlxl<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">11<\/td>\n<td class=\"code-a\">jsng<\/td>\n<td class=\"number-b\">29<\/td>\n<td class=\"code-b\">djno<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">12<\/td>\n<td class=\"code-a\">xeoa<\/td>\n<td class=\"number-b\">30<\/td>\n<td class=\"code-b\">beti<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">13<\/td>\n<td class=\"code-a\">rgdg<\/td>\n<td class=\"number-b\">31<\/td>\n<td class=\"code-b\">ewof<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">14<\/td>\n<td class=\"code-a\">aofl<\/td>\n<td class=\"number-b\">32<\/td>\n<td class=\"code-b\">mqan<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">15<\/td>\n<td class=\"code-a\">oeur<\/td>\n<td class=\"number-b\">33<\/td>\n<td class=\"code-b\">xsco<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">16<\/td>\n<td class=\"code-a\">dspu<\/td>\n<td class=\"number-b\">34<\/td>\n<td class=\"code-b\">jfiq<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">17<\/td>\n<td class=\"code-a\">jyuv<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The following is a screenshot of output from a network packet analyzer when the Flashback malware was searching mobile.twitter.com for the hashtag <strong>#pepbyfadxeoa<\/strong>, for today, March 5, 2012:<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" class=\"aligncenter size-full wp-image-3739\" title=\"flashback-twitter2\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/flashback-twitter2.png\" alt=\"\" width=\"552\" height=\"327\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/flashback-twitter2.png 552w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/flashback-twitter2-300x177.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/flashback-twitter2-100x59.png 100w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/center>In addition, in order to ensure that people checking logs don&#8217;t spot the malware, it uses a number of different user agents. Here are some examples:<\/p>\n<ul>\n<li>Mozilla\/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident\/3.1; IEMobile\/7.0; HTC; 7 Mozart T8698)<\/li>\n<li>Mozilla\/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident\/3.1; IEMobile\/7.0; HTC; mwp6985)<\/li>\n<li>Mozilla\/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident\/3.1; IEMobile\/7.0; SAMSUNG; SGH-i917)<\/li>\n<li>Mozilla\/5.0 (iPhone; CPU iPhone OS 5_0 like Mac OS X) AppleWebKit\/534.46 (KHTML, like Gecko) Version\/5.1 Mobile\/9A334 Safari\/7534.48.3<\/li>\n<li>Mozilla\/5.0 (iPhone; CPU iPhone OS 5_0 like Mac OS X) AppleWebKit\/534.46 (KHTML, like Gecko) Version\/5.1 Mobile\/9A5302b Safari\/7534.48.3<\/li>\n<li>Mozilla\/5.0 (PWNED iPod; U; CPU iPhone OS 4_2_1 like Mac OS X; en-us) AppleWebKit\/533.17.9 (KHTML, like Gecko) Version\/5.0.2 Mobile\/8C148 Safari\/6533.18.5<\/li>\n<\/ul>\n<p>There is no guarantee that there will be tweets every day, but Intego is monitoring Twitter, looking for these specific hashtags, and <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">Intego VirusBarrier X6&#8217;s web threat protection<\/a> has been updated to block searches using these combinations of characters.<\/p>\n<p>It&#8217;s worth noting that the people behind the Flashback malware most likely to not send commands every day, and certainly delete their tweets, as Intego has found no past tweets in its searches. However, the malware clearly sends these HTTP requests, looking for such tweets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate.<\/p>\n","protected":false},"author":3,"featured_media":8755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[505,153,174,86,134],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate. Many types\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flashback Mac Malware Uses Twitter as Command and Control Center - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate. Many types\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-06T00:19:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:13:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/\",\"name\":\"Flashback Mac Malware Uses Twitter as Command and Control Center - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#primaryimage\"},\"datePublished\":\"2012-03-06T00:19:36+00:00\",\"dateModified\":\"2016-02-12T18:13:01+00:00\",\"description\":\"The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate. Many types\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flashback Mac Malware Uses Twitter as Command and Control Center\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Flashback Mac Malware Uses Twitter as Command and Control Center\",\"datePublished\":\"2012-03-06T00:19:36+00:00\",\"dateModified\":\"2016-02-12T18:13:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#webpage\"},\"wordCount\":452,\"commentCount\":11,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"keywords\":[\"Botnet\",\"Flashback\",\"Mac\",\"Malware\",\"X (Twitter)\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate. Many types","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/","og_locale":"en_US","og_type":"article","og_title":"Flashback Mac Malware Uses Twitter as Command and Control Center - The Mac Security Blog","og_description":"The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate. Many types","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-03-06T00:19:36+00:00","article_modified_time":"2016-02-12T18:13:01+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/","name":"Flashback Mac Malware Uses Twitter as Command and Control Center - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#primaryimage"},"datePublished":"2012-03-06T00:19:36+00:00","dateModified":"2016-02-12T18:13:01+00:00","description":"The Flashback malware, which Intego pointed out was infecting an increasing number of Macs, turns out to be using a novel technique to operate. Many types","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flashback Mac Malware Uses Twitter as Command and Control Center"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Flashback Mac Malware Uses Twitter as Command and Control Center","datePublished":"2012-03-06T00:19:36+00:00","dateModified":"2016-02-12T18:13:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#webpage"},"wordCount":452,"commentCount":11,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","keywords":["Botnet","Flashback","Mac","Malware","X (Twitter)"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-XW","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3716"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3716"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3716\/revisions"}],"predecessor-version":[{"id":36883,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3716\/revisions\/36883"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8755"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}