{"id":58684,"date":"2016-10-25T09:25:57","date_gmt":"2016-10-25T16:25:57","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=58684"},"modified":"2016-10-25T12:38:54","modified_gmt":"2016-10-25T19:38:54","slug":"silverinstaller-sneakier-than-previously-thought","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/","title":{"rendered":"SilverInstaller, Sneakier Than Previously Thought"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-58831\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Sneaky.jpg\" alt=\"SilverInstaller Sneakier Than First Thought\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Sneaky.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Sneaky-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Sneaky-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Last week, Intego reported on the discovery of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\">new fake Flash Player installer, called SilverInstaller<\/a>.\u00a0When SilverInstaller was found, a few things didn&#8217;t add up, so the Intego malware team kept poking at it over the weekend\u00a0and\u00a0have\u00a0uncovered\u00a0some new details. What we found is that SilverInstaller is a bit sneakier than previously thought \u2014 it detects whether it&#8217;s running in a virtual machine and behaves differently.<\/p>\n<p>Here&#8217;s everything we now know about SilverInstaller.<\/p>\n<h3>Why keep poking at it?<\/h3>\n<p>Initially some of the payloads did not decompress. The PostInstall script (dropper) that is responsible for installing the payload downloads this as a compressed file &#8220;act.tgz.&#8221; This file, when examined, sometimes opened and sometimes didn&#8217;t. Why?<\/p>\n<p>Also, why does the installer say it&#8217;s going to install MacKeeper, DavinciSearch and MegaBackup but install MPlayer instead?<\/p>\n<p>Unanswered questions do not sit well with the team, so down\u00a0the rabbit hole they went.<\/p>\n<h3>All right Alice, what did they find?<\/h3>\n<p>The biggest find is the difference in behavior when the installer runs in a virtual machine or a real Mac.<\/p>\n<div class=\"\">\n<p>The installer mentions it will install several Potentially Unwanted Applications (PUA) but fails to do so. Intego&#8217;s malware\u00a0team found out this is intentional.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\" target=\"_blank\">The way malware is tested<\/a> is by setting up a virtual machine (VM) that runs a copy of macOS. This VM can be infected without having to worry about compromising the host Mac it runs on, and when the testing is done, the VM can be stored or simply deleted. It is much safer and significantly faster than infecting an actual Mac and having to re-install it completely when done.<\/p>\n<p>SilverInstaller is aware it will probably end up inside a VM to be picked apart by malware researchers, so it cleverly installs only MPlayer if it finds itself inside a VM. If it sees the Mac is an actual Mac and not a virtual one, it behaves differently. Even on an actual Mac it checks for signs of analysis and if any are found, like Packet Filtering, MPlayer is installed. However, if no analysis tools are found and the Mac is real, all of the goodies mentioned by the installer are downloaded and installed.<\/p>\n<p>I <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\">previously mentioned<\/a>:\u00a0&#8220;The Dropper downloads the Payload, which is then responsible for opening a connection to &#8220;<span class=\"\">http:\/\/i.silvinst.com&#8221; on port 80 and a shell script is then executed.&#8221; This shell script, install_unit.sh, becomes much more interesting if it finds itself downloaded to a real Mac. Rather than installing just MPlayer, it installs the following:<\/span><\/p>\n<p><strong>MacKeeper (if not already present):<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-58855\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-dropper-downloads-payload.png\" alt=\"SilverInstaller dropper downloads payload\" width=\"875\" height=\"310\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-dropper-downloads-payload.png 875w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-dropper-downloads-payload-150x53.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-dropper-downloads-payload-300x106.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-dropper-downloads-payload-768x272.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-dropper-downloads-payload-657x233.png 657w\" sizes=\"(max-width: 875px) 100vw, 875px\" \/><\/p>\n<p>It&#8217;s even nice enough to make sure the user receives a localized version, though it currently installs the same version no matter what.<\/p>\n<\/div>\n<p><strong>VSearch<\/strong><\/p>\n<blockquote><p><span style=\"color: #006d8f\">&#8220;http:\/\/i.silvinst.com\/static\/c\/c.tgz&#8221;<\/span><\/p><\/blockquote>\n<p><strong>A Pirrit\u00a0injector\u00a0(VSearch family)<\/strong><\/p>\n<blockquote><p><span style=\"color: #006d8f\">&#8220;http:\/\/i.silvinst.com\/static\/ij\/ij_v2.tgz&#8221;<\/span><\/p><\/blockquote>\n<p><strong>BrowserEnhancer, which Intego detects as VSearch<\/strong><\/p>\n<blockquote><p><span style=\"color: #006d8f\">&#8220;http:\/\/i.silvinst.com\/static\/sr\/sr_v2.tgz&#8221;<\/span><\/p><\/blockquote>\n<p><strong>And finally MPlayer<\/strong><\/p>\n<blockquote><p><span style=\"color: #006d8f\">&#8220;http:\/\/i.silvinst.com\/static\/mplayer\/MPlayer.zip&#8221;<\/span><\/p><\/blockquote>\n<p>As observed previously, the payload files are deleted when the installations are finished and the installer itself can only be used once.<\/p>\n<h3>Other Findings<\/h3>\n<p>You may recall each downloaded package has a unique file name and hash. Intego\u00a0quickly confirmed that the packages are dynamically generated (built) by the server. This not only causes every downloads installer package to have a unique name, like &#8220;FlashPlayer_01.10.pkg&#8221; or &#8220;FlashPlayer_01.18.pkg,&#8221; but also means the contents of each installer vary slightly. Part of this varying data is the dropper that downloads the payload onto a system, the &#8220;act.tgz&#8221; file mentioned earlier.<\/p>\n<p>The first time the installer runs it shows an installer that doesn&#8217;t actually do anything, runs the PostInstall script, downloads the &#8220;act.tgz&#8221; payload, decompresses it, and then downloads and installs MPlayer. When done, the payload file is deleted.<\/p>\n<p>The second time the installer is opened, it behaves the same but the result is different. This time when the payload &#8220;act.tgz&#8221; file is downloaded, it&#8217;s a fake. It does not decompress and is deleted right away. The installer knows if it has been run before by comparing keys with the server. Each package is assigned a key as it&#8217;s built by the server, and it is likely\u00a0that the installer checks with the server to see if a key has been used more than once. This basically guarantees the installer package can only be used once, even if copied to another machine on a different IP address. Here is an example of a key:<\/p>\n<div class=\"\">\n<blockquote><p>&#8220;http:\/\/t.silvinst.com\/is\/cact?i=&#8221;<span style=\"color: #006d8f\"><b class=\"\">fd4ee38b-d713-47ba-82c7-3df8790288c7<\/b><\/span>&#8220;&amp;ve=10.12\u201d<\/p><\/blockquote>\n<p>This key is the UUID, which is taken from the IOKit framework (IOPlatformUUID) by the Payload. The UUID is a unique identifier for your Mac and helps SilverInstaller keep track of which machine the installer has been run on.<\/p>\n<p>In the last few days, the people or person behind SilverInstaller has already changed a few things:<\/p>\n<ol>\n<li>The subdomain previously used by the dropper and payload to download their contents from &#8220;http:\/\/<strong>i<\/strong>.silvinst.com&#8221; has been changed in some cases to &#8220;http:\/\/<strong>t<\/strong>.silvinst.com.&#8221;<\/li>\n<li>The &#8220;act&#8221; payload in some cases is now signed with an adhoc\u00a0identifier and not a Developer ID certificate.<\/li>\n<\/ol>\n<p>Websites that these installers have been found on are extratorrent.cc and k2s.cc. Clicking on those pages will result in pop-ups and redirects that feed the fake Flash Player installers.<\/p>\n<p>Apart from the observations mentioned in the previous article, we note that the dropper does not collect User ID&#8217;s (UID&#8217;s).<\/p>\n<blockquote class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\">\n<blockquote class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"x_AppleOriginalContents\">\n<blockquote class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\"><span style=\"color: #006d8f\">$ ls -la FlashPlayer_XX.X\/base.pkg\/Scripts\/<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">total 48<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">drwxr-xr-x \u00a08 user\u00a0 admin \u00a0272 Oct 18 15:27 .<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">drwxr-xr-x \u00a06 user\u00a0 staff \u00a0204 Oct 18 15:27 ..<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">-rw-r&#8211;r&#8211; \u00a01 user\u00a0 admin \u00a0 36 Oct 17 23:35 27b86b7f-e4c5-4a4c-a56f-b54b3a423617<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">-rw-r&#8211;r&#8211; \u00a01 user\u00a0 admin \u00a0 36 Oct 17 23:35 51ef332f-6ed2-4574-aea5-6f8788661b68<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">-rw-r&#8211;r&#8211; \u00a01 user\u00a0 admin \u00a0 36 Oct 17 23:35 b45bfc63-465d-426c-8bad-f1d0dea3d202<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">-rw-r&#8211;r&#8211; \u00a01 user\u00a0 admin \u00a0 36 Oct 17 23:35 eaf2e7d6-f6c3-4f91-9428-cb10eb4e3cea<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">-rw-r&#8211;r&#8211; \u00a01 user\u00a0 admin \u00a0 36 Oct 17 23:35 f7a5b00e-fd20-45f9-9c90-7ac8a128f31f<\/span><\/div>\n<div class=\"\"><span style=\"color: #006d8f\">-rwxr-xr-x \u00a01 user\u00a0 admin \u00a0595 Oct 17 23:35 postinstall<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n<div class=\"\">\n<p>We now know that those are Generated User ID&#8217;s (GUID&#8217;s). The GUID hashes are collected, but at this time\u00a0the research team is unable to link these to existing users on an infected system. This goes for both physical users and hidden system process users.<\/p>\n<\/div>\n<h3>What can Mac users do\u00a0to protect their computers?<\/h3>\n<p>The steps Mac users can take to protect\u00a0their Macs remains unchanged; only download software from a reliable\u00a0source.<\/p>\n<h3>Manually removing SilverInstaller<\/h3>\n<p>The below list was\u00a0adjusted to reflect infection of a real Mac.\u00a0If infected, Mac users can manually remove the SilverInstaller\u00a0files to clean up the infection. From the Finder menu &#8220;Go,&#8221; select &#8220;Go to Folder&#8221; and copy\/paste the following path:<\/p>\n<ul>\n<li>\/var\/tmp\/<br \/>\nIn this folder you may find several files, delete the following:<br \/>\n\u2022 act (folder)<br \/>\n\u2022 MPlayer OS X Extended (application)<br \/>\n\u2022 MPlayer.zip (archive)<br \/>\n\u2022 re.txt (text file)<br \/>\n\u2022 c (folder)<br \/>\n\u2022 c.tgz (archive)<br \/>\n\u2022 ij (folder)<br \/>\n\u2022 ij.tgz (archive)<br \/>\n\u2022 mk.pkg (package)<br \/>\n\u2022 sr.tgz (archive)<\/li>\n<li>Delete the following applications from the Applications folder:<br \/>\n\u2022 MPLayer OS X Extended<br \/>\n\u2022 MacKeeper<\/li>\n<li>Also delete the installer\u00a0\u00a0&#8220;FlashPlayer_XX.X.pkg&#8221; from it&#8217;s download location.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0identifies\u00a0the SilverInstaller files as\u00a0<strong>OSX\/SilverInstaller<\/strong>, and if detected, VirusBarrier will eradicate it from your system.\u00a0The installers that use the <strong>t<\/strong>.silvinst.com subdomain are recognized as variant B.<\/p>\n<p>All this seems like a lot of trouble to go through just to get some PUA&#8217;s loaded onto a system, so Intego is keeping a close eye on SilverInstaller to see if it will evolve into something more.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\u00a0When SilverInstaller was found, a few things didn&#8217;t add up, so the Intego malware team kept poking at it over the weekend\u00a0and\u00a0have\u00a0uncovered\u00a0some new details. What we found is that SilverInstaller is a bit sneakier than previously thought \u2014 it detects [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":58837,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[3148,2032,3145],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\u00a0When SilverInstaller was found, a few things\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SilverInstaller, Sneakier Than Previously Thought - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\u00a0When SilverInstaller was found, a few things\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-25T16:25:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-25T19:38:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg\",\"width\":400,\"height\":260,\"caption\":\"SilverInstaller Fake Flash Player\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\",\"name\":\"SilverInstaller, Sneakier Than Previously Thought - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#primaryimage\"},\"datePublished\":\"2016-10-25T16:25:57+00:00\",\"dateModified\":\"2016-10-25T19:38:54+00:00\",\"description\":\"Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\\u00a0When SilverInstaller was found, a few things\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SilverInstaller, Sneakier Than Previously Thought\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"SilverInstaller, Sneakier Than Previously Thought\",\"datePublished\":\"2016-10-25T16:25:57+00:00\",\"dateModified\":\"2016-10-25T19:38:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#webpage\"},\"wordCount\":1287,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg\",\"keywords\":[\"OSX\/SilverInstaller\",\"PUA\/PUP\",\"SilverInstaller\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\u00a0When SilverInstaller was found, a few things","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/","og_locale":"en_US","og_type":"article","og_title":"SilverInstaller, Sneakier Than Previously Thought - The Mac Security Blog","og_description":"Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\u00a0When SilverInstaller was found, a few things","og_url":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-10-25T16:25:57+00:00","article_modified_time":"2016-10-25T19:38:54+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg","width":400,"height":260,"caption":"SilverInstaller Fake Flash Player"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/","name":"SilverInstaller, Sneakier Than Previously Thought - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#primaryimage"},"datePublished":"2016-10-25T16:25:57+00:00","dateModified":"2016-10-25T19:38:54+00:00","description":"Last week, Intego reported on the discovery of a new fake Flash Player installer, called SilverInstaller.\u00a0When SilverInstaller was found, a few things","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"SilverInstaller, Sneakier Than Previously Thought"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"SilverInstaller, Sneakier Than Previously Thought","datePublished":"2016-10-25T16:25:57+00:00","dateModified":"2016-10-25T19:38:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#webpage"},"wordCount":1287,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg","keywords":["OSX\/SilverInstaller","PUA\/PUP","SilverInstaller"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fgw","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58684"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=58684"}],"version-history":[{"count":37,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58684\/revisions"}],"predecessor-version":[{"id":58903,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58684\/revisions\/58903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/58837"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=58684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=58684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=58684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}