{"id":50782,"date":"2016-02-19T09:33:51","date_gmt":"2016-02-19T17:33:51","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=50782"},"modified":"2023-04-11T19:55:56","modified_gmt":"2023-04-12T02:55:56","slug":"oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/","title":{"rendered":"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50788\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-600x300.jpeg\" alt=\"OceanLotus fake Flash update\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Intego VirusBarrier users are protected against the OS X version of OceanLotus, a sophisticated Trojan horse that has been used to spy against businesses and government agencies.<\/p>\n<p>In May last year, Chinese security firm Qihoo360 published a <a title=\"Link to Qihoo research\" href=\"http:\/\/drops.wooyun.org\/papers\/6335\" target=\"_blank\" rel=\"nofollow noopener\">technical paper<\/a> examining a malware campaign that was said to be targeting critical areas of Chinese infrastructure \u2014 including government offices, research institutes, maritime agencies, construction and shipping enterprises.<\/p>\n<p>Sadly, Qihoo360&#8217;s paper is in Chinese (a language I don&#8217;t read!) and Google&#8217;s online translation is not perfect, but it is clear that the security firm had also seen a version of OceanLotus made specifically for the OS X platform.<\/p>\n<p>A recent <a title=\"Link to AlienVault report\" href=\"https:\/\/www.alienvault.com\/open-threat-exchange\/blog\/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> by AlienVault has brought this OS X version of OceanLotus back into the spotlight.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-50791\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/flashupdate-170.jpeg\" alt=\"Fake Flash Update\" width=\"170\" height=\"291\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/flashupdate-170.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/flashupdate-170-88x150.jpeg 88w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>There&#8217;s nothing particularly novel about the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/social-engineering\/\">social engineering<\/a> that OceanLotus uses to dupe users into infection, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\" rel=\"noopener\">posing as an update to Adobe Flash<\/a>.<\/p>\n<p>But then, an attack&#8217;s social engineering doesn&#8217;t need to be sophisticated if it is effective. Malicious hackers know that their targets are used to being prompted to install updates to widely-used applications \u2014 such as Adobe Flash \u2014 and many will not be surprised to see a pop-up appear on their screen and will click to run code without thinking carefully about the potential dangers.<\/p>\n<p>And, you may be asking, how did the criminals get the fake version of Flash to users in the first place in order to hit them with the OceanLotus malware? It appears that OceanLotus has been\u00a0spread via two different methods.<\/p>\n<p>Firstly, the malware was\u00a0distributed via watering hole attacks. This is where a particular legitimate website is compromised by online criminals, who inject malicious code into its pages. Innocent visitors to the poisoned webpages have their computers infected via a drive-by download attack, or are socially engineered into installing software that then compromises their systems.<\/p>\n<p>Examples of possible watering hole sites include websites that might cover news about a particular topic, or forums that deal with a particular industry. Online criminals target particular sites, knowing that their targets are likely to regularly visit it. Examples would include the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-malware-tibet-variant-found\/\" target=\"_blank\" rel=\"noopener\">OSX\/Tibet malware<\/a> that was distributed in the form of a <a href=\"https:\/\/www.grahamcluley.com\/2013\/09\/mac-malware\/\" target=\"_blank\" rel=\"noopener\">poisoned Java applet<\/a> on compromised websites, or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/pint-sized-backdoor-for-os-x-discovered\/\" target=\"_blank\" rel=\"noopener\">OSX\/Pintsized<\/a> that successfully <a title=\"Link to Security Ledger article\" href=\"https:\/\/securityledger.com\/2013\/03\/many-watering-holes-targets-in-hacks-that-netted-facebook-twitter-and-apple\/\" target=\"_blank\" rel=\"nofollow noopener\">infected computer systems at Facebook, Twitter, Apple, and Microsoft<\/a>, amongst others.<\/p>\n<p>The other way that OceanLotus has been\u00a0distributed is\u00a0through spear-phishing attacks, where emails carrying malicious attachments or links are targeted at workers at specific organisations with the intention of tricking them into infection.<\/p>\n<p>Files used by the malware include:<\/p>\n<ul>\n<li>FlashUpdate.app\/Contents\/MacOS\/EmptyApplication<\/li>\n<li>FlashUpdate.app\/Contents\/Resources\/en.lproj\/.DS_Stores<\/li>\n<li>FlashUpdate.app\/Contents\/Resources\/en.lproj\/.en_icon<\/li>\n<\/ul>\n<p>The malware&#8217;s loader is encoded and it decodes itself to be able to decode other files, which are used to deploy the threat locally. This makes analysis (and the creation of protection routines) harder. When the Trojan is installed, a persistent daemon runs and performs several tasks from a command &amp; control (C&amp;C) server. During Intego&#8217;s laboratory tests, the C&amp;C servers appear to be currently offline.<\/p>\n<p>In the below image you can see <a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8#netbarrier-x8\" target=\"_blank\" rel=\"noopener\">Intego NetBarrier<\/a> alerting on an attempt by the malware to receive commands from the command &amp; control servers, in order to download additional payload code. If you see such a message you should obviously block the connection.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50785\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/netbarrier.jpeg\" alt=\"Intego NetBarrier\" width=\"600\" height=\"327\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/netbarrier.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/netbarrier-150x82.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/netbarrier-300x164.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier<\/a> with up-to-date virus definitions will detect and eradicate the <strong>OSX\/OceanLotus<\/strong>\u00a0malware.<\/p>\n<p>Users are reminded that the only safe place to download security updates for Adobe Flash is directly from the Adobe website itself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?<\/p>\n","protected":false},"author":34,"featured_media":50794,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[1261,86,2800,168,2803,3172],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-19T17:33:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T02:55:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"OceanLotus Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/\",\"name\":\"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#primaryimage\"},\"datePublished\":\"2016-02-19T17:33:51+00:00\",\"dateModified\":\"2023-04-12T02:55:56+00:00\",\"description\":\"Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update\",\"datePublished\":\"2016-02-19T17:33:51+00:00\",\"dateModified\":\"2023-04-12T02:55:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#webpage\"},\"wordCount\":602,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg\",\"keywords\":[\"China\",\"Malware\",\"OceanLotus\",\"OS X\",\"OSX\/OceanLotus\",\"Social Engineering\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/","og_locale":"en_US","og_type":"article","og_title":"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update - The Mac Security Blog","og_description":"Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-02-19T17:33:51+00:00","article_modified_time":"2023-04-12T02:55:56+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg","width":400,"height":260,"caption":"OceanLotus Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/","name":"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#primaryimage"},"datePublished":"2016-02-19T17:33:51+00:00","dateModified":"2023-04-12T02:55:56+00:00","description":"Is your Mac protected against the OS X version of OceanLotus, a sophisticated trojan horse that has been used to spy against businesses and government agencies?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"OceanLotus OS X Malware Disguises Itself as Adobe Flash Update","datePublished":"2016-02-19T17:33:51+00:00","dateModified":"2023-04-12T02:55:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#webpage"},"wordCount":602,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg","keywords":["China","Malware","OceanLotus","OS X","OSX\/OceanLotus","Social Engineering"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ocean-lotus-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dd4","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50782"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=50782"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50782\/revisions"}],"predecessor-version":[{"id":97701,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50782\/revisions\/97701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/50794"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=50782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=50782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=50782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}