{"id":49678,"date":"2016-02-16T08:43:51","date_gmt":"2016-02-16T16:43:51","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49678"},"modified":"2016-03-01T08:29:31","modified_gmt":"2016-03-01T16:29:31","slug":"10-years-of-mac-malware-how-os-x-threats-have-evolved","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/","title":{"rendered":"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic]"},"content":{"rendered":"<p>Ten years ago today, Intego discovered the first major Mac malware, called &#8220;Oompa-Loompa,&#8221; also known officially by the rather nerdy name of OSX\/Oomp.A (or Leap.A).<\/p>\n<p>As Mac usage continues to steadily grow in popularity, so does the prevalence of Mac malware and security flaws\u2014the threat landscape continues to change over time. The Mac experts at Intego put together a visual timeline that highlights the nastiest, most prevalent threats to demonstrate just how Mac malware has evolved since discovering the Oompa-Loompa Trojan horse.<\/p>\n<p>Here is a look at the evolution of Mac OS X security threats,\u00a0from 2006 to 2016.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/10-years-mac-malware-infographic\/\" rel=\"attachment wp-att-50767\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50767\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/10-years-mac-malware-infographic.png\" alt=\"Mac Malware Infographic\" width=\"800\" height=\"7772\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/10-years-mac-malware-infographic.png 800w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/10-years-mac-malware-infographic-31x300.png 31w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/10-years-mac-malware-infographic-657x6383.png 657w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<div><span style=\"font-weight: bold; font-size: 14px;\">EMBED THIS INFOGRAPHIC ON YOUR SITE:<br \/>\n<\/span><br \/>\n<textarea cols=\"80\" rows=\"4\">&lt;a href=&#8221;https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/&#8221;&gt;&lt;img src=&#8221;https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/10-years-mac-malware-infographic.png&#8221; alt=&#8221;10 Years of Mac Malware: How OS X Threats Have Evolved&#8221; \/&gt; &lt;\/a&gt;&lt;br \/&gt;&lt;strong&gt;Source:&lt;\/strong&gt;&lt;a href=&#8221;https:\/\/www.intego.com&#8221; alt=&#8221;Intego&#8221;&gt;Intego&lt;\/a&gt;<\/textarea><\/div>\n<p style=\"text-align: left;\">There are new tactics being thought up daily, and there will never be a limit to what cyber-criminals are willing to do to get to your Mac and your private data. So, if you&#8217;re worried about attacks like this happening on your Mac what can you do about it?<\/p>\n<p>By taking the appropriate measures to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/15-mac-hardening-security-tips-to-protect-your-privacy\/\" target=\"_blank\">learn about Mac security<\/a> and act now to protect your Apple devices, you will find that even though the chance of being infected is always there, staying proactive and informed is the best way to keep your computer protected from the bad guys.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.<\/p>\n","protected":false},"author":4,"featured_media":50389,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,190,151],"tags":[159,174,86,168,1852,2665],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic] - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-16T16:43:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-01T16:29:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac OS X Malware Timeline 2006 - 2016\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/\",\"name\":\"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic] - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#primaryimage\"},\"datePublished\":\"2016-02-16T16:43:51+00:00\",\"dateModified\":\"2016-03-01T16:29:31+00:00\",\"description\":\"This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic]\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic]\",\"datePublished\":\"2016-02-16T16:43:51+00:00\",\"dateModified\":\"2016-03-01T16:29:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#webpage\"},\"wordCount\":278,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg\",\"keywords\":[\"Infographic\",\"Mac\",\"Malware\",\"OS X\",\"Security Threats\",\"Timeline\"],\"articleSection\":[\"Apple\",\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/","og_locale":"en_US","og_type":"article","og_title":"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic] - The Mac Security Blog","og_description":"This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-02-16T16:43:51+00:00","article_modified_time":"2016-03-01T16:29:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg","width":400,"height":260,"caption":"Mac OS X Malware Timeline 2006 - 2016"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/","name":"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic] - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#primaryimage"},"datePublished":"2016-02-16T16:43:51+00:00","dateModified":"2016-03-01T16:29:31+00:00","description":"This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic]"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic]","datePublished":"2016-02-16T16:43:51+00:00","dateModified":"2016-03-01T16:29:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#webpage"},"wordCount":278,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg","keywords":["Infographic","Mac","Malware","OS X","Security Threats","Timeline"],"articleSection":["Apple","Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/OSX-Malware-Timeline-2006-2016.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cVg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49678"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49678"}],"version-history":[{"count":30,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49678\/revisions"}],"predecessor-version":[{"id":51250,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49678\/revisions\/51250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/50389"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}