	{"id":542,"date":"2008-12-02T17:14:55","date_gmt":"2008-12-03T01:14:55","guid":{"rendered":"http:\/\/blog.intego.com\/?p=542"},"modified":"2016-02-12T09:56:16","modified_gmt":"2016-02-12T17:56:16","slug":"yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/","title":{"rendered":"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg\"><\/p>\n<p>A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan horse, but has some interesting differences with the previous versions. The samples Intego has seen, named FlashPlayer.v3.348.dmg and FlashPlayer.v..dmg, contain code that refers to Intego. The actual malware code is encoded (using a standard routine called uuencode), and when it is decoded, a line of code is present saying: \u201cbegin 666 intego\u201d. This tells the system to create a file with read and write permissions (the 666 is a shortcut for Unix permissions, not anything to do with the \u201cnumber of the beast\u201d), and to create a file, containing the malicious code, named \u201cintego\u201d. Intego wants to point out that the company obviously has nothing to do with the creation of this malware, and that the choice of this file name is a provocation from the creator of this malware.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/news\/ism0808.asp\">Read the full Intego Security Memo<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan horse, but has some interesting differences with the previous versions. The samples Intego has seen, named FlashPlayer.v3.348.dmg and FlashPlayer.v..dmg, contain code that refers to Intego. The actual malware code [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,2683,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-12-03T01:14:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T17:56:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/\",\"name\":\"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#primaryimage\"},\"datePublished\":\"2008-12-03T01:14:55+00:00\",\"dateModified\":\"2016-02-12T17:56:16+00:00\",\"description\":\"A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego\",\"datePublished\":\"2008-12-03T01:14:55+00:00\",\"dateModified\":\"2016-02-12T17:56:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#webpage\"},\"wordCount\":178,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg\",\"keywords\":[\"Malware\",\"RSPlug\",\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/","og_locale":"en_US","og_type":"article","og_title":"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego - The Mac Security Blog","og_description":"A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan","og_url":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-12-03T01:14:55+00:00","article_modified_time":"2016-02-12T17:56:16+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/","name":"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#primaryimage"},"datePublished":"2008-12-03T01:14:55+00:00","dateModified":"2016-02-12T17:56:16+00:00","description":"A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. This new variant, RSPlug.E, is similar to the RSPlug.D Trojan","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Yet Another Variant of the RSPlug Trojan Horse: This One Taunts Intego","datePublished":"2008-12-03T01:14:55+00:00","dateModified":"2016-02-12T17:56:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#webpage"},"wordCount":178,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/begin_intego.jpg","keywords":["Malware","RSPlug","Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/yet-another-variant-of-the-rsplug-trojan-horse-this-one-taunts-intego\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8K","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/542"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=542"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/542\/revisions"}],"predecessor-version":[{"id":7262,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/542\/revisions\/7262"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}