{"id":515,"date":"2008-11-20T10:27:47","date_gmt":"2008-11-20T09:27:47","guid":{"rendered":"http:\/\/blog.intego.com\/?p=515"},"modified":"2020-02-05T10:54:40","modified_gmt":"2020-02-05T18:54:40","slug":"intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/","title":{"rendered":"Hacker tool used to create Mac Trojan horse malware &#8211; Intego issues Security Memo"},"content":{"rendered":"<p>Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on compromised Mac OS X computers. Intego discovered this hacker tool in August 2008, and determined that it was not a serious threat. Unlike true malware and Trojan horses, OSX.TrojanKit.Malez requires that a hacker already have access to a Mac in order to install the code. As of the present, no Trojan horses or other means of replication have been found in the wild using this tool. In spite of recent reports, this represents no serious threat to Macintosh computers.<\/p>\n<p>This hacker tool can be used to create a \u201cbackdoor\u201d on a Mac OS X computer. This backdoor then gives a hacker remote access to the computer. The code is added to an unsigned third-party application that is installed manually on a Mac, and, when the application is run, the backdoor is activated. It creates a file named com.apple.DockSettings in ~\/Library\/LaunchAgents, and the backdoor is launched at each login. The binary of the original application is placed in ApplicationName.app\/Contents\/MacOS\/2, and the binary of the backdoor is found in ApplicationName.app\/Contents\/MacOS\/1. The tool modifies the application\u2019s info.plist file so it points to the latter location.<\/p>\n<p>There are therefore only two modes of transmission of this hacker tool: the first is if someone sends another user an infected application, either in a .zip archive or a disk image, and the second is when a hacker obtains network access to a Mac and replaces an existing application with an infected version.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20081121045240\/http:\/\/www.intego.com\/news\/ism0807.asp\" target=\"_blank\" rel=\"noopener noreferrer\">Read the full security memo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on compromised Mac OS X computers. Intego discovered this hacker tool in August 2008, and determined that it was not a serious threat. Unlike true malware and Trojan horses, OSX.TrojanKit.Malez [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8763,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker tool used to create Mac Trojan horse malware - Intego issues Security Memo - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-11-20T09:27:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-05T18:54:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/\",\"name\":\"Hacker tool used to create Mac Trojan horse malware - Intego issues Security Memo - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#primaryimage\"},\"datePublished\":\"2008-11-20T09:27:47+00:00\",\"dateModified\":\"2020-02-05T18:54:40+00:00\",\"description\":\"Reports have been circulating about a new Mac \\u201cmalware\\u201d or \\u201cTrojan horse\\u201d, usually under the name \\u201cOSX.Lamzev.A\\u201d, which is claimed to open a back door on\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker tool used to create Mac Trojan horse malware &#8211; Intego issues Security Memo\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Hacker tool used to create Mac Trojan horse malware &#8211; Intego issues Security Memo\",\"datePublished\":\"2008-11-20T09:27:47+00:00\",\"dateModified\":\"2020-02-05T18:54:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#webpage\"},\"wordCount\":295,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"articleSection\":[\"Malware\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/","og_locale":"en_US","og_type":"article","og_title":"Hacker tool used to create Mac Trojan horse malware - Intego issues Security Memo - The Mac Security Blog","og_description":"Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-11-20T09:27:47+00:00","article_modified_time":"2020-02-05T18:54:40+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/","name":"Hacker tool used to create Mac Trojan horse malware - Intego issues Security Memo - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#primaryimage"},"datePublished":"2008-11-20T09:27:47+00:00","dateModified":"2020-02-05T18:54:40+00:00","description":"Reports have been circulating about a new Mac \u201cmalware\u201d or \u201cTrojan horse\u201d, usually under the name \u201cOSX.Lamzev.A\u201d, which is claimed to open a back door on","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Hacker tool used to create Mac Trojan horse malware &#8211; Intego issues Security Memo"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Hacker tool used to create Mac Trojan horse malware &#8211; Intego issues Security Memo","datePublished":"2008-11-20T09:27:47+00:00","dateModified":"2020-02-05T18:54:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#webpage"},"wordCount":295,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-issues-security-memo-about-a-hacker-tool-that-can-be-used-to-create-trojan-horses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","articleSection":["Malware","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8j","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/515"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=515"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/515\/revisions"}],"predecessor-version":[{"id":90985,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/515\/revisions\/90985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}