{"id":60796,"date":"2017-01-05T15:56:35","date_gmt":"2017-01-05T23:56:35","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=60796"},"modified":"2017-01-06T09:20:13","modified_gmt":"2017-01-06T17:20:13","slug":"denial-of-service-attack-targets-mac-and-ios-users","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/","title":{"rendered":"Denial of Service Attack Targets Mac and iOS Users"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-60892\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack-Attack.jpg\" alt=\"Denial of Service Attack Targets Mac and iOS Users\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack-Attack.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack-Attack-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack-Attack-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This week, 9to5Mac <a href=\"https:\/\/9to5mac.com\/2017\/01\/04\/malwarebytes-warns-of-denial-of-service-attacks-on-macs-but-blocked-by-latest-sierra-update\/\" target=\"_blank\">reported<\/a> on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused by malware,\u00a0it appears to be a malicious script loaded by a web browser instead, in this case Safari.<\/p>\n<p>This DoS attack is not <a href=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" target=\"_blank\">malware<\/a> in the traditional sense, because nothing is actually installed on the\u00a0affected system. What is\u00a0happening is that links to malicious site(s) that run this script are sent via email from email addresses dean.jones9875@gmail.com and amannn.2917@gmail.com. These email addresses are also recorded as registration info for the malicious domains. It is currently unknown if the emails contain a simple text link or an application that may change the browser\u2019s home page to the malicious site.<\/p>\n<p>Some of the websites that trigger the DoS are safari-get[.]com, safari-get[.]net, safari-serverhost[.]com and safari-serverhost[.]net. At the time of writing, all but the last domain\u00a0are inactive. There could, of course, be many other websites yet discovered that trigger the same behavior.<\/p>\n<p>With one of the known sites still active, Intego was\u00a0able to test the reported behavior, which we will detail below.<\/p>\n<h3>Observed Behavior<\/h3>\n<p>The malicious site loads a script that opens the Mail application and drafts a new email with the subject \u201cWarning! Virus Detected! Immediately Call Apple Support,\u201d and a phone number that is most definitely not Apple\u2019s (it is known to be associated with similar scams). It doesn\u2019t just draft one of those emails, it drafts hundreds until your Mac runs out of memory and locks up.<\/p>\n<p>Attempts to quick or force quick Mail will\u00a0not work, instead, doing so causes\u00a0the browser script to open Mail\u00a0again and begin\u00a0drafting fresh emails. The browser must be closed first to stop the script, and then Mail can be closed. However, since Safari remembers the last page that was open when it was quit, the next time Safari is launched the fun starts all over again. Even if the Mail application is not configured, it keeps opening and asks to add an account.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-60808\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-Mail.jpg\" alt=\"dos-result-apple-mail\" width=\"1024\" height=\"605\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-Mail.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-Mail-150x89.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-Mail-300x177.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-Mail-768x454.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-Mail-657x388.jpg 657w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The behavior mentioned above was tested on OS X 10.9, 10.10, 10.11 and 10.12, and was observed on\u00a0all of them. Only macOS 10.12.1 and up (safari 10.0.1 and newer) appear to protect against this attack with Safari recognizing the attempts and warning the user.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-60814 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-10.12.1-and-up.jpg\" alt=\"dos-result-10-12-1-and-up\" width=\"487\" height=\"137\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-10.12.1-and-up.jpg 487w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-10.12.1-and-up-150x42.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-10.12.1-and-up-300x84.jpg 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/p>\n<p>On the affected systems, Safari is the most vulnerable to this attack. Google Chrome loads the script and launches Mail, but once Mail is quit, Chrome does not re-open it. Chrome itself does freeze, though. Firefox briefly stalls when loading the website, and then offers to stop the malicious script.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-60820 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-firefox.jpg\" alt=\"dos-result-firefox\" width=\"503\" height=\"217\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-firefox.jpg 503w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-firefox-150x65.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-firefox-300x129.jpg 300w\" sizes=\"(max-width: 503px) 100vw, 503px\" \/><\/p>\n<p>For Mac users who\u00a0are not running macOS 10.12.1 or newer, the use of Firefox is highly recommended as it is constantly updated even for older OS X versions, and it appears to protect from at least this particular attack. Upgrading to the latest macOS version\u00a0is of course preferred.<\/p>\n<p>The page checks for a specific version of the operating system\u00a0and loads a script accordingly. In our testing, on several versions of OS X, only the script that opened Mail was loaded\u2014but when Malwarebytes <a href=\"https:\/\/blog.malwarebytes.com\/101\/mac-the-basics\/2017\/01\/tech-support-scam-page-attempts-denial-of-service-via-mail-app\/\" target=\"_blank\">investigated<\/a>, they found another script that opened iTunes instead of Mail. We triggered this script by manually tweaking the web address. A different style webpage loads and iTunes is opened, which, in our testing on different OS X versions, crashed immediately.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-60835\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iTunes.jpg\" alt=\"dos-result-apple-itunes\" width=\"1023\" height=\"578\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iTunes.jpg 1023w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iTunes-150x85.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iTunes-300x170.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iTunes-768x434.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iTunes-657x371.jpg 657w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" \/><\/p>\n<h3>Mitigation on a Mac<\/h3>\n<p>If this DoS attack has already hit you and you are currently looking at a locked up Mac, or are unable to open Safari without it hijacking your Mail again, there are some steps you can take to clear this up.<\/p>\n<ol>\n<li><strong>Force quit Safari first, then force quit Mail<\/strong><br \/>\nIf possible, force quit the applications in that order. Quitting Mail first will simply cause Safari to open it again.<\/li>\n<li><strong>Restart your Mac<\/strong><br \/>\nYour Mac is either very slow, as Mail used up most of its memory, or it&#8217;s frozen completely. A restart will free the memory and give you a smooth running Mac to work with. If the Mac is frozen, holding down the power button until it shuts off is your only option. If your Mac automatically starts Safari or you have it set to remember which applications were open before the restart, you may immediately be thrown back into the same behavior.<br \/>\nAt this point your Mac still has enough free memory to function, so immediately pull up the Force Quit window by pressing the following keys:<br \/>\n<code>'Option-Command-Escape'<\/code><br \/>\nThen select Safari and force quit it, followed by Mail.<\/li>\n<li><strong>Reset Safari<\/strong><br \/>\nThe malicious site has to be cleared from Safari, but this can&#8217;t be done from inside Safari. Luckily, this can be easily done without losing your bookmarks or saved passwords. You&#8217;ll need to locate the folder that saves the last state Safari was in when it quit. This can be found in your user <strong>home folder<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>Saved Application State<\/strong>. In that folder, delete the folder named &#8220;<strong>com.apple.Safari.savedState<\/strong>.&#8221; You can now start Safari and it should open with your default home page. The malicious link will be saved in Safari&#8217;s history, so make sure to erase it there as well.<\/li>\n<li><strong>Clear Mail<\/strong><br \/>\nThere&#8217;s a good chance that Mail was kind enough to save all those drafts for you, and they will pop up again when you start the app. To clear all those drafts out you&#8217;ll have to manually delete them from your hard drive. (This is also a good time to make sure your backup is current!) Go to your user <strong>home folder<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>Mail<\/strong> &gt; <strong>V2<\/strong> (V3 or V4 depending on your version of OS X). In that folder you will see several folders that are named after your email accounts, starting with &#8220;IMAP&#8221; or &#8220;POP.&#8221; Check each of those folders to see if they contain a &#8220;<strong>Drafts.mbox<\/strong>&#8221; folder. Open the drafts folder and inside will be another folder with a long name, such as &#8220;<strong>A1344DBE-5B24-4398-8320-E78F80208689<\/strong>,&#8221; or something similar. Inside that folder is <strong>Data<\/strong> &gt; <strong>Messages<\/strong>.<br \/>\nThe messages are numbered, so using <a href=\"https:\/\/support.apple.com\/kb\/PH21920?locale=en_US\" target=\"_blank\">QuickLook<\/a> (don&#8217;t double-click them as this will open the Mail app) you&#8217;ll have to check them all to see if it&#8217;s one of the virus warning drafts or a draft you had saved yourself. If you&#8217;re lucky, there are a few dozen or less. If you&#8217;re not so lucky, there may be hundreds. Of course, if you know there were no drafts you saved, you can just clear out the entire &#8220;<strong>Messages<\/strong>&#8221; folder and empty the Trash. Ironically, the drafts are still there, they just no longer have a sender, subject or content. To prevent the actual draft windows from opening, there is one more file that needs to be deleted. This can be found in the same <strong>V2<\/strong> (V3 or V4) folder &gt; <strong>MailData<\/strong>. Delete the file named &#8220;<strong>Envelope Index<\/strong>.&#8221;<br \/>\nNow when you start Mail, you&#8217;ll be greeted with a &#8220;Mail Message Import&#8221; window. Scary as it sounds, all your email is still there, Mail just has no idea because\u00a0you&#8217;ve just deleted the index file. Mail will import all the mail, rebuild the index file and you are back in business.<\/li>\n<\/ol>\n<h3>Mitigation on iOS<\/h3>\n<p>On iOS 8, 9 and the current 10, loading the malicious website also results in a new Mail message being drafted\u2014but only one draft is created.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-60841 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9.jpg\" alt=\"dos-result-apple-ipad-ios-9\" width=\"750\" height=\"465\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9.jpg 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-300x186.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-657x407.jpg 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>This single draft can be cancelled and deleted, but a new one will pop up straight away. Therefore, you will need to clear Safari history and website data. To clear Safari on the iOS device, it has to be reset, which can be done by going to <strong>Settings<\/strong> &gt; <strong>Safari<\/strong> &gt; <strong>Clear History and Website Data<\/strong>.<\/p>\n<p>Loading the script that calls iTunes on the Mac has no effect on iOS, instead it\u00a0just shows the webpage without opening any other app.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-60844 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-1.jpg\" alt=\"dos-result-apple-ipad-ios-9-1\" width=\"750\" height=\"465\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-1.jpg 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-1-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-1-300x186.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-result-Apple-iPad-iOS-9-1-657x407.jpg 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>While not malware in the traditional sense, this DoS\u00a0shows there are multiple ways to attack a Mac or iOS user. In this case, not a lot of effort was put into the scripting that triggered Mail or iTunes. The authors could have made the emails actually send to various different addresses, acting as a spammer on their behalf, for example. Still there are many, many users who\u00a0may actually contact the phone number presented on their screen and pay the scammers for &#8220;support.&#8221; This\u00a0makes\u00a0these scams so successful they are likely not going anywhere anytime soon.<\/p>\n<p>Be vigilant when you receive email from someone you don&#8217;t know, especially when an email contains links or buttons. On the Mac, hover your cursor over the link to see what site it will really send you to. On iOS devices, just press and hold on a link to see a pop-up with the real URL in it.\u00a0And remember: If you don&#8217;t trust it, delete it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused by malware,\u00a0it appears to be a malicious script loaded by a web browser instead, in this case Safari. This DoS attack is not malware in the traditional sense, because [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":60898,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[2746,69,174,115],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Denial of Service Attack Targets Mac and iOS Users - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-05T23:56:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T17:20:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg\",\"width\":400,\"height\":260,\"caption\":\"DoS Safari Hijack\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/\",\"name\":\"Denial of Service Attack Targets Mac and iOS Users - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#primaryimage\"},\"datePublished\":\"2017-01-05T23:56:35+00:00\",\"dateModified\":\"2017-01-06T17:20:13+00:00\",\"description\":\"This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\\u00a0While this DoS was described\\u00a0as an\\u00a0attack caused\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Denial of Service Attack Targets Mac and iOS Users\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Denial of Service Attack Targets Mac and iOS Users\",\"datePublished\":\"2017-01-05T23:56:35+00:00\",\"dateModified\":\"2017-01-06T17:20:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#webpage\"},\"wordCount\":1491,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg\",\"keywords\":[\"DoS\",\"iOS\",\"Mac\",\"Safari\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/","og_locale":"en_US","og_type":"article","og_title":"Denial of Service Attack Targets Mac and iOS Users - The Mac Security Blog","og_description":"This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused","og_url":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-01-05T23:56:35+00:00","article_modified_time":"2017-01-06T17:20:13+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg","width":400,"height":260,"caption":"DoS Safari Hijack"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/","name":"Denial of Service Attack Targets Mac and iOS Users - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#primaryimage"},"datePublished":"2017-01-05T23:56:35+00:00","dateModified":"2017-01-06T17:20:13+00:00","description":"This week, 9to5Mac reported on a tech support scam that caused a Denial of Service (DoS) attack on a Mac.\u00a0While this DoS was described\u00a0as an\u00a0attack caused","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Denial of Service Attack Targets Mac and iOS Users"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Denial of Service Attack Targets Mac and iOS Users","datePublished":"2017-01-05T23:56:35+00:00","dateModified":"2017-01-06T17:20:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#webpage"},"wordCount":1491,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg","keywords":["DoS","iOS","Mac","Safari"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/denial-of-service-attack-targets-mac-and-ios-users\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/DoS-Safari-Hijack.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fOA","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/60796"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=60796"}],"version-history":[{"count":35,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/60796\/revisions"}],"predecessor-version":[{"id":60937,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/60796\/revisions\/60937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/60898"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=60796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=60796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=60796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}