	{"id":42118,"date":"2015-06-02T07:49:51","date_gmt":"2015-06-02T14:49:51","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=42118"},"modified":"2015-07-02T07:38:36","modified_gmt":"2015-07-02T14:38:36","slug":"rootkit-sleep","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/","title":{"rendered":"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-42121\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-600x300.jpeg\" alt=\"Sleep\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>When you stop using your Mac, do you let it go to sleep or perform a full shutdown?<\/p>\n<p>Maybe you will consider turning your Mac off properly, after reading about one security researcher&#8217;s worrying discovery.<\/p>\n<p>A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit.<\/p>\n<p>Sounds familiar? It should, because earlier this year we discussed a similar attack known as <a title=\"OS X 10.10.2 Update Released \u2013 Fixing Thunderstrike and other Security Vulnerabilities\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-10-10-2-update-released-fixing-thunderstrike-and-other-security-vulnerabilities\/\" target=\"_blank\">Thunderstrike<\/a>, which Apple fixed in OS X 10.10.2.<\/p>\n<p>In Thunderstrike&#8217;s case, researcher Trammel Hudson <a title=\"Link to Thunderstrike research\" href=\"https:\/\/trmm.net\/Thunderstrike\" target=\"_blank\" rel=\"nofollow\">described in detail<\/a> how a Mac Thunderbolt port could be exploited to install malicious code in the ROM EFI boot chip on a MacBook.<\/p>\n<p>But the new vulnerability, uncovered by OS X security researcher Pedro Vila\u00e7a and dubbed &#8220;Prince Harming&#8221; by Katie Moussouris, goes further, and appears to be more serious than Thunderstrike \u2013 because it does not require physical access to the targeted device.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-42130\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/research-paper.jpeg\" alt=\"Research paper\" width=\"600\" height=\"254\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/research-paper.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/research-paper-150x63.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/research-paper-300x127.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Instead, Vila\u00e7a has <a title=\"Link to Pedro Vilaca's research\" href=\"https:\/\/reverse.put.as\/2015\/05\/29\/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken\/\" target=\"_blank\" rel=\"nofollow\">described<\/a> how Apple computers made before mid-2014 are vulnerable to attack when awakened after they have been in sleep mode for 30 seconds or longer.<\/p>\n<p>The problem, according to Vila\u00e7a, is that the computer&#8217;s low-level firmware is left unlocked \u2013 providing an opportunity for unauthorised code to be injected into its ROM EFI boot chip in the form of a malicious rootkit.<\/p>\n<blockquote><p>&#8220;And you ask, what the hell does this mean? It means that you can overwrite the contents of your BIOS from userland and rootkit EFI without any other trick other than a suspend-resume cycle, a kernel extension, flashrom, and root access.&#8221;<\/p>\n<p>&#8220;Wait, am I saying Macs EFI can be rootkitted from userland without all the tricks from Thunderbolt that Trammell presented? Yes I am! And that is one hell of a hole :-).&#8221;<\/p><\/blockquote>\n<p>Such an attack could be delivered remotely without physical access to the targeted computer by exploiting browser vulnerabilities and enticing a computer to visit a boobytrapped webpage. Provided their computer had entered sleep mode during the current cycle, it could be exploited.<\/p>\n<p>And, as Vila\u00e7a <a title=\"Link to Ars Technica article\" href=\"http:\/\/arstechnica.com\/security\/2015\/06\/new-remote-exploit-leaves-most-macs-vulnerable-to-permanent-backdooring\/\" target=\"_blank\" rel=\"nofollow\">told <em>Ars Technica<\/em><\/a>, it may be that hackers could force a targeted computer to enter sleep mode first:<\/p>\n<blockquote><p>&#8220;An exploit could either verify if the computer already went previously into sleep mode and it&#8217;s exploitable, it could wait until the computer goes to sleep, or it can force the sleep itself and wait for user intervention to resume the session. I&#8217;m not sure most users would suspect anything fishy is going on if their computer just goes to sleep. That is the default setting anyway on OS X.&#8221;<\/p><\/blockquote>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-42124\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/apple-tree-roots.jpeg\" alt=\"Apple tree roots\" width=\"170\" height=\"212\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/apple-tree-roots.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/apple-tree-roots-120x150.jpeg 120w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>And once the rootkit is in place, it could potentially go undetected for some time.<\/p>\n<p>Vila\u00e7a says he has tested that the vulnerability works against a MacBook Pro Retina, a MacBook Pro, and a MacBook Air, all running the latest available EFI firmware. All, he says, are vulnerable.<\/p>\n<p>However, he believes that all computers made after mid\/late 2014 are not vulnerable.<\/p>\n<blockquote><p>&#8220;I expect all mid\/late 2014 machines and newer to not be vulnerable. Apple either fixed it by accident or they know about it. It\u2019s not something you just fix by accident, just sayin\u2019.&#8221;<\/p><\/blockquote>\n<p>Fortunately, an attack via remote exploitation would almost certainly be possible for <a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">anti-virus software<\/a> to detect, as the malicious code would need to run on the computer.<\/p>\n<p>But that&#8217;s your opportunity for prevention. If your ROM EFI boot chip has already been compromised, you&#8217;ve got a much bigger problem on your hands. Because any malware installed upon it could be programmed to avoid being removed by firmware-flashing software, meaning you might need to resort to an expensive hardware fix.<\/p>\n<p>We have to hope that Apple will see fit to roll out a fix sooner rather than later for older computers. But in the meantime, maybe you would be wise to get into the habit of turning off your Mac computer rather than leaving it in sleep mode.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit.<\/p>\n<p>And it all depends on your computer entering sleep mode&#8230;<\/p>\n","protected":false},"author":34,"featured_media":42133,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,190],"tags":[86,2239,517,1891,2236],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit.  And it all depends on your computer entering sleep mode...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit.  And it all depends on your computer entering sleep mode...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-02T14:49:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-02T14:38:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/\",\"name\":\"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#primaryimage\"},\"datePublished\":\"2015-06-02T14:49:51+00:00\",\"dateModified\":\"2015-07-02T14:38:36+00:00\",\"description\":\"A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit. And it all depends on your computer entering sleep mode...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac\",\"datePublished\":\"2015-06-02T14:49:51+00:00\",\"dateModified\":\"2015-07-02T14:38:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#webpage\"},\"wordCount\":661,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg\",\"keywords\":[\"Malware\",\"Pedro Vila\\u00e7a\",\"Rootkit\",\"Thunderstrike\",\"UEFI\"],\"articleSection\":[\"Apple\",\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit.  And it all depends on your computer entering sleep mode...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/","og_locale":"en_US","og_type":"article","og_title":"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac - The Mac Security Blog","og_description":"A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit.  And it all depends on your computer entering sleep mode...","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-06-02T14:49:51+00:00","article_modified_time":"2015-07-02T14:38:36+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/","name":"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#primaryimage"},"datePublished":"2015-06-02T14:49:51+00:00","dateModified":"2015-07-02T14:38:36+00:00","description":"A new zero-day vulnerability has been discovered on older Mac computers, opening opportunities for hackers to meddle with the system BIOS and install a rootkit. And it all depends on your computer entering sleep mode...","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac","datePublished":"2015-06-02T14:49:51+00:00","dateModified":"2015-07-02T14:38:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#webpage"},"wordCount":661,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg","keywords":["Malware","Pedro Vila\u00e7a","Rootkit","Thunderstrike","UEFI"],"articleSection":["Apple","Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/sleep-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-aXk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/42118"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=42118"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/42118\/revisions"}],"predecessor-version":[{"id":43582,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/42118\/revisions\/43582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/42133"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=42118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=42118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=42118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}