{"id":5069,"date":"2012-07-13T19:18:18","date_gmt":"2012-07-14T02:18:18","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5069"},"modified":"2016-02-12T10:28:42","modified_gmt":"2016-02-12T18:28:42","slug":"another-multi-platform-trojan-variant-discovered","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/","title":{"rendered":"Another Multi-Platform Trojan Variant Discovered"},"content":{"rendered":"<p>Earlier this week we wrote about a new <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-multi-platform-backdoor-discovered\/\">multi-platform Backdoor trojan<\/a> that uses a Java component to determine which OS is being used and then delivers a different version of the threat for Windows, Linux or OS X. Previous variants would not work on OS X versions newer than Snow Leopard as the threat required Rosetta to function on Intel hardware.<\/p>\n<p>Now a new variant has been discovered that no longer has this restriction on OS X. This is not unexpected with threats generated by kits, such as the previous\u00a0 variant \u2013 it\u2019s common to continue modifying the threat over time to make more effective malware. We&#8217;ve seen this with a variety of recent OS X threats such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/tibet-c-malware-delivered-by-poisoned-word-documents-installs-backdoors-on-macs\/\">Tibet<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-sabpab-variant-uses-word-files-to-infect-macs\/\">Sabpab<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-flashback\/\">Flashback<\/a>.<\/p>\n<p>Because malware authors frequently try to refine their creations over time, we always endeavor to add generic detection for threats that will protect against new variants. This new Backdoor is another case where generic detection has been effective; components of the new variant are detected with current virus definitions as OSX\/ShellCode.gen or OSX\/MetaData.gen.<\/p>\n<p>In order to protect yourself against this new threat, make sure you have the latest virus definitions for <a href=\"https:\/\/www.intego.com\/virusbarrier\">Intego VirusBarrier X6<\/a>. You may also wish to disable Java, as this is frequently used by malware to silently install new malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.<\/p>\n","protected":false},"author":6,"featured_media":4535,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[30,86,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Another Multi-Platform Trojan Variant Discovered - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-14T02:18:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:28:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"100\" \/>\n\t<meta property=\"og:image:height\" content=\"100\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png\",\"width\":\"100\",\"height\":\"100\",\"caption\":\"Malware Alert\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/\",\"name\":\"Another Multi-Platform Trojan Variant Discovered - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#primaryimage\"},\"datePublished\":\"2012-07-14T02:18:18+00:00\",\"dateModified\":\"2016-02-12T18:28:42+00:00\",\"description\":\"There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Another Multi-Platform Trojan Variant Discovered\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Another Multi-Platform Trojan Variant Discovered\",\"datePublished\":\"2012-07-14T02:18:18+00:00\",\"dateModified\":\"2016-02-12T18:28:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#webpage\"},\"wordCount\":225,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png\",\"keywords\":[\"Backdoor\",\"Malware\",\"Trojan Horse\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/","og_locale":"en_US","og_type":"article","og_title":"Another Multi-Platform Trojan Variant Discovered - The Mac Security Blog","og_description":"There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-07-14T02:18:18+00:00","article_modified_time":"2016-02-12T18:28:42+00:00","og_image":[{"width":"100","height":"100","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png","width":"100","height":"100","caption":"Malware Alert"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/","name":"Another Multi-Platform Trojan Variant Discovered - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#primaryimage"},"datePublished":"2012-07-14T02:18:18+00:00","dateModified":"2016-02-12T18:28:42+00:00","description":"There has been a new variant of a multi-platform Backdoor trojan discovered that no longer requires Rosetta to be run on OS X using Intel hardware. It uses a Java component to determine what OS is being used, and then delivers a different version of the threat for Windows, Linux or OS X.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Another Multi-Platform Trojan Variant Discovered"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Another Multi-Platform Trojan Variant Discovered","datePublished":"2012-07-14T02:18:18+00:00","dateModified":"2016-02-12T18:28:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#webpage"},"wordCount":225,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png","keywords":["Backdoor","Malware","Trojan Horse"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/another-multi-platform-trojan-variant-discovered\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/04\/malware-alert.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1jL","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5069"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5069"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5069\/revisions"}],"predecessor-version":[{"id":5080,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5069\/revisions\/5080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/4535"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}