{"id":57667,"date":"2016-09-27T14:08:37","date_gmt":"2016-09-27T21:08:37","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=57667"},"modified":"2016-11-03T16:06:24","modified_gmt":"2016-11-03T23:06:24","slug":"new-komplex-trojan-malware-targeting-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/","title":{"rendered":"New &#8216;Komplex&#8217; Trojan Malware Targeting Macs [Updated]"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-57700\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Mac-Trojan.jpg\" alt=\"Komplex Trojan Malware Targeting Macs\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Mac-Trojan.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Mac-Trojan-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Mac-Trojan-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A new OS X malware has been\u00a0<a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/09\/unit42-sofacys-komplex-os-x-trojan\/\" target=\"_blank\" rel=\"nofollow\">discovered<\/a>\u00a0by security researchers from Palo Alto Networks. The malware, named &#8220;Komplex,&#8221; is a Mac Trojan created\u00a0by the Sofacy Group\u00a0and is apparently\u00a0targeting the aerospace industry.<\/p>\n<p>During analysis, the researchers found that Komplex malware was used in the past by exploiting a MacKeeper vulnerability. However, this\u00a0new Komplex\u00a0Trojan is targeting Macs by way of\u00a0email attachments. Here&#8217;s what you need to know to stay safe!<\/p>\n<p><strong>What is the infection vector?<\/strong><\/p>\n<p>Komplex ends up on a user&#8217;s system through spear phishing, a method used by cyber criminals to get a victim to open an email with a malicious attachment, and masks as a Russian aerospace program information PDF.<\/p>\n<p>The person who receives the email\u00a0may\u00a0think they are opening a PDF file with future plans for the Russian aerospace program, but\u00a0in fact, it is a Trojan that will install files on the system and connect to a remote command &amp; control (c&amp;c) server. An actual PDF with said Russian aerospace details is opened in Preview, but this is just a decoy. This PDF is not downloaded but is part of the malicious attachment and is written in place.<\/p>\n<p><strong>Where does Komplex install?<\/strong><\/p>\n<p>The Trojan\u00a0waits for an Internet connection and attempts to send a GET request to Google to confirm it&#8217;s not running in an\u00a0anti-analysis\/sandbox\u00a0environment. After confirming an active Internet connection, the Komplex payload begins carrying out its main functionality. Several files are placed on the system upon install and then moved to their final locations, which are:<\/p>\n<p>\u2022 \/Users\/$USER\/Library\/LaunchAgents\/com.apple.updates.plist<br \/>\n\u2022 \/Users\/Shared\/.local\/kextd<\/p>\n<p>Files are initially placed in \/Users\/Shared\/, but are moved to their final destination:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-57775\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/komplex-malware-install-paths.png\" alt=\"Komplex malware install path\" width=\"377\" height=\"242\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/komplex-malware-install-paths.png 377w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/komplex-malware-install-paths-150x96.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/komplex-malware-install-paths-300x193.png 300w\" sizes=\"(max-width: 377px) 100vw, 377px\" \/><\/p>\n<p>Once all components are in place and Komplex is up and running,\u00a0it\u00a0can download, install and execute additional malware, as well as delete files.<\/p>\n<p>While Komplex installs, the following pop-up may appear:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-57811\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Install-Warning.png\" alt=\"Komplex Install Warning\" width=\"573\" height=\"305\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Install-Warning.png 573w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Install-Warning-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Install-Warning-300x160.png 300w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/><\/p>\n<p>It&#8217;s important to note that regardless of which button is clicked, the malware will install. This warning is triggered by the binder (the executables responsible for installing the malware), which uses the SetFile command.<\/p>\n<p><strong>Should Mac users be concerned?<\/strong><\/p>\n<p>While Komplex does not appear to be doing anything malicious after installing itself, this can change instantly\u00a0if the Sofacy Group decides to send commands for the C&amp;C servers to relay. The risk here is currently for those working in the aerospace industry, but this technique can be used against OS X\u00a0and\u00a0macOS users anywhere.<\/p>\n<p>As mentioned above, Komplex was used in the past by exploiting a MacKeeper vulnerability against Mac users. Another\u00a0tool that Komplex\u00a0shares a significant amount of functionality and traits with, called\u00a0Carberp, was also\u00a0used in past\u00a0<a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/06\/unit42-new-sofacy-attacks-against-us-government-agency\/\" target=\"_blank\" rel=\"nofollow\">attacks against Windows systems<\/a>.<\/p>\n<p>The report mentions, &#8220;In addition to shared code and functionality, we also discovered Komplex command and control (C2) domains that overlapped with previously identified phishing campaign infrastructures associated with the Sofacy Group,&#8221; and &#8220;A benefit of retaining many of the same functionalities within the Windows and OS X Trojans is that it would require fewer alterations to the C2 server application to handle cross-platform implants,&#8221; which makes it easier for Sofacy Group to adapt and release future malware.<\/p>\n<p>The Sofacy Group, also known as Fancy Bear, Pawn Storm, APT28 and Sednit has been active for years and has attacked government agencies in Eastern Europe and the West as well as several media organizations. They are believed to be behind the data breach at the National Committee of the Democratic Party and most recently the\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/3119880\/russian-hackers-allegedly-target-the-world-anti-doping-agency.html\" target=\"_blank\" rel=\"nofollow\">hacking of the world anti-doping agency<\/a>. A group like this is not likely to go away any time soon, so more malware from them can be expected.<\/p>\n<p><strong>What steps can Mac users take to protect their computers?<\/strong><\/p>\n<p>If infected, Mac users can manually remove the Komplex files to clean up the infection. From the Finder menu &#8220;Go,&#8221; select &#8220;Go to Folder&#8221; and copy\/paste each of the following paths (replace $USER with your own home folder name):<\/p>\n<p>\u2022\u00a0\/Users\/$USER\/Library\/LaunchAgents\/com.apple.updates.plist<br \/>\n\u2022\u00a0\/Users\/Shared\/.local\/kextd<\/p>\n<p>If the files are found, your Mac is probably infected. Move the files to your trash and restart your Mac, then empty the trash and check the locations again. Your Mac should now be clear of Komplex.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0detects all known components of Komplex malware, identified as <strong>OSX\/Komplex<\/strong>. Intego is\u00a0still investigating; we will update this story when new information is available.<\/p>\n<address><em>This story has been updated.<\/em><\/address>\n","protected":false},"excerpt":{"rendered":"<p>A new OS X malware has been\u00a0discovered\u00a0by security researchers from Palo Alto Networks. The malware, named &#8220;Komplex,&#8221; is a Mac Trojan created\u00a0by the Sofacy Group\u00a0and is apparently\u00a0targeting the aerospace industry. During analysis, the researchers found that Komplex malware was used in the past by exploiting a MacKeeper vulnerability. However, this\u00a0new Komplex\u00a0Trojan is targeting Macs by [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":57706,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[3133,86,3130,3136,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A new OS X malware has been\u00a0discovered\u00a0by security researchers from Palo Alto Networks. The malware, named &quot;Komplex,&quot; is a Mac Trojan created\u00a0by the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New &#039;Komplex&#039; Trojan Malware Targeting Macs [Updated] - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A new OS X malware has been\u00a0discovered\u00a0by security researchers from Palo Alto Networks. The malware, named &quot;Komplex,&quot; is a Mac Trojan created\u00a0by the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-27T21:08:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-03T23:06:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg\",\"width\":400,\"height\":260,\"caption\":\"Komplex Trojan Horse Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/\",\"name\":\"New 'Komplex' Trojan Malware Targeting Macs [Updated] - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#primaryimage\"},\"datePublished\":\"2016-09-27T21:08:37+00:00\",\"dateModified\":\"2016-11-03T23:06:24+00:00\",\"description\":\"A new OS X malware has been\\u00a0discovered\\u00a0by security researchers from Palo Alto Networks. The malware, named \\\"Komplex,\\\" is a Mac Trojan created\\u00a0by the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New &#8216;Komplex&#8217; Trojan Malware Targeting Macs [Updated]\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"New &#8216;Komplex&#8217; Trojan Malware Targeting Macs [Updated]\",\"datePublished\":\"2016-09-27T21:08:37+00:00\",\"dateModified\":\"2016-11-03T23:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#webpage\"},\"wordCount\":759,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg\",\"keywords\":[\"Komplex\",\"Malware\",\"OSX\/Komplex\",\"Sofacy Group\",\"Trojan Horse\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A new OS X malware has been\u00a0discovered\u00a0by security researchers from Palo Alto Networks. The malware, named \"Komplex,\" is a Mac Trojan created\u00a0by the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/","og_locale":"en_US","og_type":"article","og_title":"New 'Komplex' Trojan Malware Targeting Macs [Updated] - The Mac Security Blog","og_description":"A new OS X malware has been\u00a0discovered\u00a0by security researchers from Palo Alto Networks. The malware, named \"Komplex,\" is a Mac Trojan created\u00a0by the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-09-27T21:08:37+00:00","article_modified_time":"2016-11-03T23:06:24+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg","width":400,"height":260,"caption":"Komplex Trojan Horse Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/","name":"New 'Komplex' Trojan Malware Targeting Macs [Updated] - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#primaryimage"},"datePublished":"2016-09-27T21:08:37+00:00","dateModified":"2016-11-03T23:06:24+00:00","description":"A new OS X malware has been\u00a0discovered\u00a0by security researchers from Palo Alto Networks. The malware, named \"Komplex,\" is a Mac Trojan created\u00a0by the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New &#8216;Komplex&#8217; Trojan Malware Targeting Macs [Updated]"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"New &#8216;Komplex&#8217; Trojan Malware Targeting Macs [Updated]","datePublished":"2016-09-27T21:08:37+00:00","dateModified":"2016-11-03T23:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#webpage"},"wordCount":759,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg","keywords":["Komplex","Malware","OSX\/Komplex","Sofacy Group","Trojan Horse"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/Komplex-Trojan-Horse.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-f07","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57667"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=57667"}],"version-history":[{"count":35,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57667\/revisions"}],"predecessor-version":[{"id":59191,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57667\/revisions\/59191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/57706"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=57667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=57667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=57667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}