{"id":56704,"date":"2016-09-09T09:45:46","date_gmt":"2016-09-09T16:45:46","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=56704"},"modified":"2016-09-12T11:02:17","modified_gmt":"2016-09-12T18:02:17","slug":"uptick-in-malware-and-vulnerabilities-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/","title":{"rendered":"Uptick in Malware and Vulnerabilities: What You Need to Know"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-56785\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/malware-on-the-rise.jpg\" alt=\"Mac malware on the rise\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/malware-on-the-rise.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/malware-on-the-rise-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/malware-on-the-rise-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to be aware of so you can stay protected.<\/p>\n<p>The recent\u00a0uptick in malware began over the summer\u00a0with the discovery of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\" target=\"_blank\">Eleanor<\/a>, a piece of malware that opens a backdoor on OS X masquerading as a file converter app. Less than\u00a0a month later followed\u00a0the discovery of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/adwind-rat-malware-everything-you-need-to-know\/\" target=\"_blank\">Adwind RAT<\/a>, a remote access trojan targeting OS X.<\/p>\n<p>That same month, we learned of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/emergency-ios-9-3-5-update-thwarts-pegasus-spyware-patch-now\/\" target=\"_blank\">Pegasus exploit affecting iOS<\/a>, giving those who targeted and infected an iOS device full access over its contents; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-el-capitan-yosemite-security-updates-patch-trident-flaws\/\" target=\"_blank\">Apple patched the same flaws in OS X<\/a> about a week later. Though no in the wild exploit like Pegasus is known to target OS X, it is not a stretch to think it may have been out there.<\/p>\n<p>August was a busy month as the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-spreads-through-modified-transmission-application-again\/\" target=\"_blank\">Keydnap malware was found<\/a> to hitch a ride on the Transmission application, stealing the OS X keychain contents from those infected.<\/p>\n<p>That\u2019s just the kind of trouble that was out there for OS X and iOS users in the last two months. Luckily, Apple patched the vulnerabilities that allowed Pegasus to run and Intego protects its customers\u00a0from the above mentioned malware.<\/p>\n<p>While there currently appears to be no active malware out there that can pose a threat, Intego is following several potential threats. Following are a few of these potential threats that Mac users need to be aware of.<\/p>\n<h3><strong>Potential new Adwind RAT<\/strong><\/h3>\n<p>Early September we learned of a file being distributed through email that, when opened, opens a backdoor on an OS X system and keeps an active connection to a remote server. It also creates a LaunchAgent to keep itself alive if a user logs out or restarts the computer. The process that runs in the background identifies itself as \u201cStreamMainer,\u201d which is a name that has been linked to Adwind in the past.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-StreamMainer-Process.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-56725\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-StreamMainer-Process.jpg\" alt=\"Adware-RAT-StreamMainer-Process\" width=\"703\" height=\"112\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-StreamMainer-Process.jpg 703w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-StreamMainer-Process-150x24.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-StreamMainer-Process-300x48.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-StreamMainer-Process-657x105.jpg 657w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><br \/>\nTraffic that was monitored between the backdoor and the server showed a certificate by \u201cassylias.Inc,\u201d which was also an indication this may be a version of Adwind.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-56728\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab.jpg\" alt=\"Adware-RAT-pcap-grab\" width=\"1040\" height=\"327\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab.jpg 1040w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab-150x47.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab-300x94.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab-1024x322.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Adware-RAT-pcap-grab-657x207.jpg 657w\" sizes=\"(max-width: 1040px) 100vw, 1040px\" \/><\/a><br \/>\n<strong>Installing<\/strong><\/p>\n<p>When the malicious file is opened, Java installs files in the following locations:<\/p>\n<ul>\n<ul>\n<li>\/.test.txt<\/li>\n<li>\/Users\/$USER\/Library\/LaunchAgents\/org.Dell.plist<\/li>\n<li>\/Users\/$USER\/.Dell (containing the following files:)\n<ul>\n<li>\/Dell<\/li>\n<li>\/ID.txt<\/li>\n<li>\/YTyiNIrqiic (containing the following files:)\n<ul>\n<li>\/SdtnKbfLft.AEFCU<\/li>\n<li>rGeLnFsWWp.AEFCU<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/ul>\n<p><strong>How to know\u00a0if your Mac is infected<\/strong><\/p>\n<p>From the Finder menu &#8220;Go&#8221;, select &#8220;Go to Folder&#8221; and copy\/paste each of the following paths (replace $USER with your own home folder name):<\/p>\n<ul>\n<li>\/Users\/$USER\/Library\/LaunchAgents\/org.Dell.plist<\/li>\n<li>\/Users\/$USER\/Dell\/<\/li>\n<li>\/.test.txt<\/li>\n<\/ul>\n<p>If the files or folders are found, your Mac is probably infected. Move the files to your trash and restart your Mac, then empty the trash and check the locations again. Your Mac should now be clear of Adwind RAT.<\/p>\n<p>There is no indication at this time that the backdoor it creates is being used to steal data (or even if this malicious file is being actively spread online). As a precaution, <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects this as <strong>Java\/Adwind<\/strong>,\u00a0so Intego users will be protected from it or whatever it may become.<\/p>\n<h3><strong>iWorm\u2028 dubbed as fake Flash Player<\/strong><\/h3>\n<p>Intego has also learned of a Trojan posing as a fake Flash Player installer;\u00a0a sneaky little bug that saw <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\" target=\"_blank\">previous iterations<\/a> open a backdoor on an infected system and steals files among other things. This particular version does not appear to activate the backdoor though, and in fact, the installation fails.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/iWorm-Installation-fails.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-56734\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/iWorm-Installation-fails.jpg\" alt=\"iWorm-Installation-fails\" width=\"551\" height=\"183\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/iWorm-Installation-fails.jpg 551w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/iWorm-Installation-fails-150x50.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/iWorm-Installation-fails-300x100.jpg 300w\" sizes=\"(max-width: 551px) 100vw, 551px\" \/><\/a><br \/>\nThis could just be a Proof of Concept or the beginning of a functional Trojan horse. It is currently not known how (or even if) this Trojan is spreading in the wild, but VirusBarrier is ready for any potential encounters and detects it as <strong>OSX\/iWorm<\/strong>.<\/p>\n<h3><strong>&#8220;Mokes\u2028&#8221; Malware<\/strong><\/h3>\n<p>This week a backdoor for OS X was <a href=\"http:\/\/www.zdnet.com\/article\/sophisticated-mac-os-x-backdoor-uncovered\/\" target=\"_blank\">discovered<\/a>. This cross platform malware is able to infect Windows and Linux systems as well, though an OS X sample of this backdoor was only recently uncovered. Mokes can take screenshots of an infected system as well as steal Office documents, record keystrokes, capture audio and video and execute commands.<\/p>\n<p><strong>Installing<\/strong><\/p>\n<p>When executed for the first time, the malware copies itself to the first available of the following locations, in this order:<\/p>\n<ul>\n<li>\/Users\/$USER\/Library\/App Store\/storeuserd<\/li>\n<li>\/Users\/$USER\/Library\/com.apple.spotlight\/SpotlightHelper<\/li>\n<li>\/Users\/$USER\/Library\/Dock\/com.apple.dock.cache<\/li>\n<li>\/Users\/$USER\/Library\/Skype\/SkypeHelper<\/li>\n<li>\/Users\/$USER\/Library\/Dropbox\/DropboxCache<\/li>\n<li>\/Users\/$USER\/Library\/Google\/Chrome\/nacld<\/li>\n<li>\/Users\/$USER\/Library\/Firefox\/Profiles\/profiled<\/li>\n<\/ul>\n<p>Corresponding to that location, it creates a LaunchAgent to achieve persistence on the system, so restarting the Mac will have\u00a0no effect on its functionality.<\/p>\n<p><strong>How to know\u00a0if your Mac is infected<\/strong><\/p>\n<p>From the Finder menu &#8220;Go,&#8221; select &#8220;Go to Folder&#8221; and copy\/paste each of the above mentioned paths (replace $USER with your own home folder name). Again, if the files are found you are probably infected with Mokes. Remove the files and restart your Mac, then check for these files again to make sure they were properly deleted.<\/p>\n<p>How this malware spreads\u00a0is currently unknown,\u00a0but if it finds its way onto your system, <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> will detect it as <strong>OSX\/Mokes<\/strong> and swiftly kick it to the curb.<\/p>\n<p>Not every piece of malware is worthy of news coverage, but no news does not always mean good news. Intego\u2019s malware team is\u00a0hard at work analyzing potential threats every day of the week to make sure end users are protected.<\/p>\n<p>While it\u2019s certainly good to know your Mac antivirus\u00a0software has your back, you can take some additional steps to protect yourself.<\/p>\n<ol>\n<li><strong>Only download software from the official source.<\/strong> To use iWorm as an example, if a website prompts you for a Flash Player update (some even start the download without asking), ignore it. You hopefully don\u2019t even have Flash Player installed at this point, but if you do, go to the Adobe website to see if a new Flash Player version is available. More useful tips <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">can be found here<\/a>. The same goes for Java and other plug-ins you may have installed.<\/li>\n<li><strong>Make sure the official source of your software has a good reputation.<\/strong> This typically rules out MacUpdate, download.com, Softonic and bit torrent sites. If you find a website that lists files available for download, research that website. The first page of search results is usually a good testimony to the reputation of that website.<\/li>\n<li><strong>Keep your operating systems and applications up to date.<\/strong> Using The App Store on both your Mac and iPhone you can keep your applications (and the system itself on the Mac) up to date. Updates and security patches serve an important purpose so it is recommended to install them when you can.<\/li>\n<li><strong>Use caution when connected to networks that are not your own.<\/strong> See <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-your-mac-safe-at-universities-and-public-networks\/\" target=\"_blank\">this guide on how to protect your Mac or iPhone<\/a> when connecting to public Wi-Fi networks.<\/li>\n<li>You guessed it: <strong>Implement a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\" target=\"_blank\">solid backup strategy<\/a> to keep your data safe.<\/strong> Be it from malware, ransomware or hardware failure, a smart\u00a0backup system is always a good idea.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to be aware of so you can stay protected. The recent\u00a0uptick in malware began over the summer\u00a0with the discovery of Eleanor, a piece of malware that opens a backdoor on OS [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":56794,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[3025,86,1495,3109],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uptick in Malware and Vulnerabilities: What You Need to Know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-09T16:45:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-09-12T18:02:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg\",\"width\":400,\"height\":260,\"caption\":\"Uptick in Mac Malware and Vulnerabilities\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\",\"name\":\"Uptick in Malware and Vulnerabilities: What You Need to Know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#primaryimage\"},\"datePublished\":\"2016-09-09T16:45:46+00:00\",\"dateModified\":\"2016-09-12T18:02:17+00:00\",\"description\":\"Intego has seen a\\u00a0recent\\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uptick in Malware and Vulnerabilities: What You Need to Know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Uptick in Malware and Vulnerabilities: What You Need to Know\",\"datePublished\":\"2016-09-09T16:45:46+00:00\",\"dateModified\":\"2016-09-12T18:02:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#webpage\"},\"wordCount\":1213,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg\",\"keywords\":[\"Java\/Adwind\",\"Malware\",\"OSX\/iWorm\",\"OSX\/Mokes\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Uptick in Malware and Vulnerabilities: What You Need to Know - The Mac Security Blog","og_description":"Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-09-09T16:45:46+00:00","article_modified_time":"2016-09-12T18:02:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg","width":400,"height":260,"caption":"Uptick in Mac Malware and Vulnerabilities"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/","name":"Uptick in Malware and Vulnerabilities: What You Need to Know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#primaryimage"},"datePublished":"2016-09-09T16:45:46+00:00","dateModified":"2016-09-12T18:02:17+00:00","description":"Intego has seen a\u00a0recent\u00a0increase in malware that affects Apple products, and while these threats are currently low risk, there are few things you need to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Uptick in Malware and Vulnerabilities: What You Need to Know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Uptick in Malware and Vulnerabilities: What You Need to Know","datePublished":"2016-09-09T16:45:46+00:00","dateModified":"2016-09-12T18:02:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#webpage"},"wordCount":1213,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg","keywords":["Java\/Adwind","Malware","OSX\/iWorm","OSX\/Mokes"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Uptick-Malware-Mokes-Adwind-iWorm.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-eKA","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/56704"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=56704"}],"version-history":[{"count":45,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/56704\/revisions"}],"predecessor-version":[{"id":56926,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/56704\/revisions\/56926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/56794"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=56704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=56704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=56704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}