	{"id":57,"date":"2007-11-06T10:33:31","date_gmt":"2007-11-06T08:33:31","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/11\/06\/the-latest-mac-trojan-from-porn-sites-to-politics\/"},"modified":"2007-11-06T10:33:31","modified_gmt":"2007-11-06T08:33:31","slug":"the-latest-mac-trojan-from-porn-sites-to-politics","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/","title":{"rendered":"The Latest Mac Trojan: From Porn Sites to Politics?"},"content":{"rendered":"<p>As you saw in our recent <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-alert-osxrspluga-trojan-horse\/\">Intego Security Alert<\/a>, &#8220;A malicious Trojan horse has been found on several pornography web sites, claiming to install a video codec necessary to view free pornographic videos.&#8221; This Trojan horse, OSX.RSPlug.A, is a variant of malware that has been making the rounds of Windows for some months. It&#8217;s been interesting to note some of the reactions in the press, as the usual head-in-the-sand commentators brush this threat off us just another load of hot air. However, Intego was worried not only about the malware, but about the fact that it might spread to the kind of sites that people would visit more willingly.<\/p>\n<p><a href=\"http:\/\/www.theregister.co.uk\/2007\/11\/02\/fake_presidential_site_spyware\/\">The Register<\/a> notes that the Windows version of this malware, known, among others, as Zlob, has been spotted on websites claiming to provide information about US presidential candidates. Users may install this &#8220;codec&#8221; to see videos of their candidates, or to download screen savers. Some of these sites have been &#8220;advertised&#8221; by massive spam campaigns, in an attempt to lure as many users as possible.<\/p>\n<p>The Mac Trojan was touted specifically in Mac forums (since going to the sites where it is present will only affect Mac users, not Windows users), but there&#8217;s no reason why these malware creators will not develop multi-platform sites, so all users will get the appropriate Trojans. As always, <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">Intego VirusBarrier<\/a> protects you from this threat, but be safe, and only download software from trusted sites. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you saw in our recent Intego Security Alert, &#8220;A malicious Trojan horse has been found on several pornography web sites, claiming to install a video codec necessary to view free pornographic videos.&#8221; This Trojan horse, OSX.RSPlug.A, is a variant of malware that has been making the rounds of Windows for some months. It&#8217;s been [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As you saw in our recent Intego Security Alert, &quot;A malicious Trojan horse has been found on several pornography web sites, claiming to install a video\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Latest Mac Trojan: From Porn Sites to Politics? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As you saw in our recent Intego Security Alert, &quot;A malicious Trojan horse has been found on several pornography web sites, claiming to install a video\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-11-06T08:33:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/\",\"name\":\"The Latest Mac Trojan: From Porn Sites to Politics? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-11-06T08:33:31+00:00\",\"dateModified\":\"2007-11-06T08:33:31+00:00\",\"description\":\"As you saw in our recent Intego Security Alert, \\\"A malicious Trojan horse has been found on several pornography web sites, claiming to install a video\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Latest Mac Trojan: From Porn Sites to Politics?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"The Latest Mac Trojan: From Porn Sites to Politics?\",\"datePublished\":\"2007-11-06T08:33:31+00:00\",\"dateModified\":\"2007-11-06T08:33:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#webpage\"},\"wordCount\":251,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As you saw in our recent Intego Security Alert, \"A malicious Trojan horse has been found on several pornography web sites, claiming to install a video","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/","og_locale":"en_US","og_type":"article","og_title":"The Latest Mac Trojan: From Porn Sites to Politics? - The Mac Security Blog","og_description":"As you saw in our recent Intego Security Alert, \"A malicious Trojan horse has been found on several pornography web sites, claiming to install a video","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-11-06T08:33:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/","name":"The Latest Mac Trojan: From Porn Sites to Politics? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-11-06T08:33:31+00:00","dateModified":"2007-11-06T08:33:31+00:00","description":"As you saw in our recent Intego Security Alert, \"A malicious Trojan horse has been found on several pornography web sites, claiming to install a video","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Latest Mac Trojan: From Porn Sites to Politics?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"The Latest Mac Trojan: From Porn Sites to Politics?","datePublished":"2007-11-06T08:33:31+00:00","dateModified":"2007-11-06T08:33:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-latest-mac-trojan-from-porn-sites-to-politics\/#webpage"},"wordCount":251,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-V","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=57"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}