	{"id":52459,"date":"2016-04-12T10:31:09","date_gmt":"2016-04-12T17:31:09","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=52459"},"modified":"2016-10-07T11:36:43","modified_gmt":"2016-10-07T18:36:43","slug":"mac-users-attacked-fake-adobe-update","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/","title":{"rendered":"Mac Users Attacked Again by Fake Adobe Flash Update"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52468\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg\" alt=\"Fake Flash update\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.<\/p>\n<p>Intego security experts have identified the rogue package installer as a variant of <strong>OSX\/InstallCore<\/strong>, and have updated <a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a> definitions to provide protection.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-52504\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Volume-info.png\" alt=\"Fake Flash Volume info\" width=\"500\" height=\"405\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Volume-info.png 974w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Volume-info-150x122.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Volume-info-300x243.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Volume-info-657x532.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The in-the-wild attack has been spread in the form of a Mac Package installer .pkg file, also known a flat package, and has been signed with a legitimate Developer ID certificate \u2014 effectively tricking OS X&#8217;s built-in Gatekeeper security to believe that the files can be trusted and are not malicious.<\/p>\n<p>Curiously, if the\u00a0Mac Package installer, called Product.pkg, is located outside the DMG volume and the DMG volume Installer is unmounted, then you\u00a0will receive a &#8220;Missing parameters&#8221; error.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-52519\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Installer-Missing-parameters.png\" alt=\"Installer Missing parameters\" width=\"500\" height=\"354\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Installer-Missing-parameters.png 642w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Installer-Missing-parameters-150x106.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Installer-Missing-parameters-300x213.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>However, if the Package installer is located in the DMG volume, then you will be prompted to\u00a0continue\u00a0the installation.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-52483\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/flash-panel.jpeg\" alt=\"Fake Flash installer\" width=\"500\" height=\"359\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/flash-panel.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/flash-panel-150x108.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/flash-panel-300x216.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>As a result, victims may find that their OS X computers have had a number of potentially unwanted programs (PUPs) installed on their systems. Intego researchers report that third-party apps they have seen being installed by the fake Adobe Flash update include MegaBackup, ZipCloud, and MacKeeper.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-52486\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/offer-panel.jpeg\" alt=\"The fake Flash installer offers to install other apps\" width=\"500\" height=\"358\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/offer-panel.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/offer-panel-150x107.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/offer-panel-300x215.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Embedded within the installer&#8217;s code is a copyright message, referencing an Israeli company that develops the InstallCore software installation platform, and has been criticised in the past for <a title=\"Link to Business Insider article\" href=\"http:\/\/uk.businessinsider.com\/ironsource-denies-its-for-malware-2015-3\" target=\"_blank\" rel=\"nofollow\">&#8220;turning a blind eye to malware&#8221;<\/a>:<\/p>\n<blockquote><p>Copyright \u00a9 2016 ironSource. All rights reserved.<\/p><\/blockquote>\n<p>Two months ago we described how an <a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-flash-player-update-infects-mac-with-scareware\/\" target=\"_blank\">earlier version of OSX\/InstallCore had been spread<\/a> after Mac users began to see bogus pop-up warnings about Adobe Flash requiring an update, which resulted in scareware being installed onto their computers.<\/p>\n<p>In both this and the previous instance, online criminals signed their malicious code with an Apple developer certificate, allowing the malware to bypass a key part of OS X&#8217;s built-in defence.<\/p>\n<p>In an attempt to prevent malicious code from infecting OS X computers, by default you are only allowed to run programs that have been downloaded from the official App Store or that have come from &#8220;identified developers.&#8221;<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-52489\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/gatekeeper-170.jpeg\" alt=\"Gatekeeper\" width=\"170\" height=\"176\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/gatekeeper-170.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/gatekeeper-170-145x150.jpeg 145w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>By using a valid Apple developer certificate, the attackers are tricking OS X into believing that their code can be trusted and allowed to execute \u2014 with potentially dangerous consequences.<\/p>\n<p>There are a variety of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/researcher-demonstrates-how-malware-can-bypass-os-xs-completely-broken-gatekeeper\/\" target=\"_blank\">ways to exploit security holes in OS X Gatekeeper<\/a> to allow malicious code to sneak onto computers, but presently it seems the simplest method of all is to sign your code with a developer&#8217;s certificate.<\/p>\n<p>All of which raises the question \u2014 from where are the attackers getting their valid Apple developer certificates?<\/p>\n<p>A definite possibility is that some OS X developers are being too careless with their own security, and not recognising the need to properly protect their certificates from hackers.<\/p>\n<p>At the time of writing, the compromised Apple developer ID certificate (MDK7FNV856, in the name of one Nikolay Nikolay Lastovka) has not been revoked.<\/p>\n<p>The seemingly never-ending advisories from Adobe about newly-discovered security holes in Flash Player have made critical updates a regular occurrence. There is a certain irony that security professionals have devoted a lot of time in warning the general public about the importance of installing patches and keeping their Flash installations updated, only to see online criminals exploiting the situation by launching their own attacks as warnings that Flash needs to be updated.<\/p>\n<p>Is it possible that the security of all OS X users is being put at risk because some developers are blind to the threat of their own Macs being attacked, and are carelessly allowing themselves to be hacked and confidential certificates to be stolen?<\/p>\n<p>Ultimately the only safe place to get your Adobe Flash Player update is <a title=\"Link to Adobe Flash Player\" href=\"http:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\" rel=\"nofollow\">from Adobe itself<\/a>, and if you are uncertain \u2014 read our guide on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">how to tell if an Adobe Flash update is valid<\/a>.<\/p>\n<p>The best advice for many users may be to ensure that you have configured Adobe Flash Player to automatically update itself \u2014 while retaining the option to trigger manual updates if you can&#8217;t wait for Adobe to get around to updating your system.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-52384\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available.png\" alt=\"Adobe Flash Player 21.0.0.213 Available \" width=\"500\" height=\"280\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available.png 715w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available-300x168.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available-657x368.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>If you still find the regular appearance of security holes in Adobe Flash disturbing, you may wish to take further action such as <a href=\"https:\/\/www.grahamcluley.com\/2016\/03\/update-adobe-flash-uninstall-completely\/\" target=\"_blank\">uninstalling Adobe Flash completely<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.<\/p>\n","protected":false},"author":34,"featured_media":52474,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[979,2677,86,2674,2032],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac Users Attacked Again by Fake Adobe Flash Update - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-12T17:31:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T18:36:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/\",\"name\":\"Mac Users Attacked Again by Fake Adobe Flash Update - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#primaryimage\"},\"datePublished\":\"2016-04-12T17:31:09+00:00\",\"dateModified\":\"2016-10-07T18:36:43+00:00\",\"description\":\"Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac Users Attacked Again by Fake Adobe Flash Update\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Mac Users Attacked Again by Fake Adobe Flash Update\",\"datePublished\":\"2016-04-12T17:31:09+00:00\",\"dateModified\":\"2016-10-07T18:36:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#webpage\"},\"wordCount\":710,\"commentCount\":10,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"keywords\":[\"Adobe Flash\",\"Fake Flash Player\",\"Malware\",\"OSX\/InstallCore\",\"PUA\/PUP\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/","og_locale":"en_US","og_type":"article","og_title":"Mac Users Attacked Again by Fake Adobe Flash Update - The Mac Security Blog","og_description":"Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-04-12T17:31:09+00:00","article_modified_time":"2016-10-07T18:36:43+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","width":400,"height":260,"caption":"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/","name":"Mac Users Attacked Again by Fake Adobe Flash Update - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#primaryimage"},"datePublished":"2016-04-12T17:31:09+00:00","dateModified":"2016-10-07T18:36:43+00:00","description":"Mac users are once again being urged to exercise caution when installing updates to Adobe Flash Player, after a fake update was discovered infecting computers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac Users Attacked Again by Fake Adobe Flash Update"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Mac Users Attacked Again by Fake Adobe Flash Update","datePublished":"2016-04-12T17:31:09+00:00","dateModified":"2016-10-07T18:36:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#webpage"},"wordCount":710,"commentCount":10,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","keywords":["Adobe Flash","Fake Flash Player","Malware","OSX\/InstallCore","PUA\/PUP"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dE7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/52459"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=52459"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/52459\/revisions"}],"predecessor-version":[{"id":52495,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/52459\/revisions\/52495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52474"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=52459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=52459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=52459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}