{"id":62287,"date":"2017-02-08T12:01:41","date_gmt":"2017-02-08T20:01:41","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=62287"},"modified":"2017-02-09T12:46:52","modified_gmt":"2017-02-09T20:46:52","slug":"new-malware-underscores-the-danger-of-assumed-mac-security","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/","title":{"rendered":"New Malware Underscores the Danger of Assumed Mac Security"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-62395\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-mac-malware.jpg\" alt=\"Mac Malware &quot;MacDownloader&quot; Underscores the Danger of Assumed Mac Security\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-mac-malware.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-mac-malware-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-mac-malware-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This week researchers <a href=\"https:\/\/iranthreats.github.io\/resources\/macdownloader-macos-malware\/\" target=\"_blank\">found a piece of malware<\/a> in the wild, built to steal passwords from the macOS keychain. Named &#8220;MacDownloader&#8221; and posing as, what else, a fake Flash Player update, the new malware\u00a0was found on the Mac of a human rights advocate and believed to originate from Iran. The malware&#8217;s code is very sloppy and appears to have been made by an amateur who\u00a0took pieces of other&#8217;s code and repurposed them.<\/p>\n<p>The threat report mentions the following:<\/p>\n<blockquote><p>MacDownloader seems to be poorly developed and created towards the end of 2016, potentially a first attempt from an amateur developer. In multiple cases, the code used has been copied from elsewhere. The simple activity of downloading the remote file appears to have been sourced from a cheat sheet. The main purpose of MacDownloader seems to be to perform an initial profiling of the infected system and collection of credentials from macOS\u2019s Keychain password manager \u2013 which mirrors the focus of Windows malware developed by the same actors.<\/p><\/blockquote>\n<p>At this time, it appears the malware is not a threat and the Command &amp; Control server has been taken down. <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> offers protection from this malware, detected as <strong>OSX\/MacDownloader<\/strong>.<\/p>\n<h3>Malware payload<\/h3>\n<p>Security researchers found that this malware was originally designed as a fake Bitdefender antivirus, but was later repackaged as a fake Flash Player update.\u00a0Once installed, the\u00a0malware attempts to achieve persistence by use of a poorly implemented shell script, which at the time of writing did not function due to the C&amp;C server being offline.<\/p>\n<h3>How MacDownloader tricks Mac users<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-62293\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/fake-flash-player-1.png\" alt=\"fake-flash-player-1\" width=\"500\" height=\"218\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/fake-flash-player-1.png 734w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/fake-flash-player-1-150x65.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/fake-flash-player-1-300x131.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/fake-flash-player-1-657x286.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>MacDownloader displays a fake Flash Player update that offers an &#8220;Update Flash-Player&#8221; button and a &#8220;Close&#8221; button. Unlike other malware of its kind, clicking the Close button actually exists the installer and nothing malicious is placed on the system. If the Update button is clicked though, a malware dialog will pop-up, which is, of course, fake as well.<\/p>\n<div id=\"attachment_62341\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-Fake-Detection.png\"><img aria-describedby=\"caption-attachment-62341\" loading=\"lazy\" class=\"wp-image-62341\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-Fake-Detection.png\" alt=\"mv-2734-fake-detection\" width=\"500\" height=\"230\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-Fake-Detection.png 644w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-Fake-Detection-150x69.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-Fake-Detection-300x138.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-62341\" class=\"wp-caption-text\">These dialogues are also rife with basic typos and grammatical errors, indicating that the developer paid little attention to quality control.<\/p><\/div>\n<p>After a user clicks on OK, the software mimics the System Preferences to request the admin password in order to grab more info on the system. If the user enters their password and clicks OK, the software grabs the info, and then it tries to open a remote connection to:<\/p>\n<pre>connect to 46.17.97.37 on TCP port 80 (http)\r\n\r\n\tIP Address\t46.17.97.37\r\n\tReverse DNS Name\tNo Reverse Name\r\n\tEstablished by\t\/Users\/intego\/Desktop\/addone flashplayer.app\/Contents\/MacOS\/Bitdefender Adware Removal Tool\r\n\tProcess ID\t1228\r\n\tUser\tintego (UID: 501)<\/pre>\n<p>MacDownloader collects user keychain information and uploads it to said C&amp;C server, including documents the running processes, installed applications and the username and password, which are acquired through a\u00a0fake System Preferences dialog.<\/p>\n<p>The name and password, which in almost all cases are Administrator credentials, give the malware everything it needs to access the keychain information. With access to the keychain the sky is the limit, because email account passwords, social network account details, and much more, are all\u00a0stored in the keychain. (More than enough information for identity theft!) With all the information collected and sent to their server, a dialog is displayed showing the Flash Player update was completed. Of course, no Flash Player was ever installed or updated.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-62347 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-End-Message.png\" alt=\"mv-2734-end-message\" width=\"420\" height=\"154\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-End-Message.png 420w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-End-Message-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/MV-2734-End-Message-300x110.png 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/p>\n<p>The researchers also made an interesting observation:<\/p>\n<blockquote><p>While Windows remains the dominant operating system in the world, many communities have shifted over to macOS in the interest of security and stability. However, much of the added security afforded to macOS users stems from an expectation of Windows by attackers and less readily-available remote access tools for the OS, rather than better in-built defenses. Thus, macOS users are at risk of assuming greater protection against malware than actually exists, and could be more vulnerable as a result. One of these communities is the human rights community, especially those focused on Iran, which based on anecdotal experience is strongly dependent on Apple devices.<\/p><\/blockquote>\n<p>Translation: the notion that people who are drawn to Macs &#8220;in the interest of security,&#8221; coupled with an inherent belief that Macs offer &#8220;greater protection against malware than actually exists,&#8221; leads to an interesting target group for state sponsors of hacking.<\/p>\n<h3><em>Still alive<\/em>: myths about malware in general, but Macs especially<\/h3>\n<p>Could it be true? Is the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/\" target=\"_blank\">old myth<\/a> that Macs are safer than Windows machines, straight out of the box, still alive?<\/p>\n<p>I was first introduced to Mac in 1996 and got my first Mac at home in 1998. Back then, the mantras &#8220;there are no viruses for Mac&#8221; and &#8220;Mac is more secure than Windows,&#8221; among others, were accepted as simple truth. By all means, download anything, insert any CD or ZIP drive, because nothing bad can happen, you&#8217;re on a Mac! Today, over two decades later, a lot of Mac users still think these &#8220;truths&#8221; apply. As the researchers pointed out, there are communities that moved to Mac, because they feel it offers them greater protection. This goes for businesses and consumers as well.<\/p>\n<p>If you&#8217;ve been reading The Mac Security Blog\u00a0for a while, you are well aware there are\u00a0plenty of malware for the Mac, and these are not the only threats that can affect Mac users. For example, using unsecured Wi-Fi can get your information intercepted, whether you use a Mac or a PC. Not using a firewall can get you hacked, whether you use a Mac or a PC. And just this week another Mac threat was found in the form of a Microsoft Office Word macro, more info on that <a href=\"https:\/\/objective-see.com\/blog\/blog_0x17.html\" target=\"_blank\">here<\/a>.<\/p>\n<p>Even on a Mac it&#8217;s important to be security minded. This means using <a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\" target=\"_blank\">layered security<\/a> such as a firewall and antivirus solution. This also means <a href=\"https:\/\/www.intego.com\/mac-security-blog\/15-mac-hardening-security-tips-to-protect-your-privacy\/\" target=\"_blank\">hardening your macOS<\/a> installation itself and using best practices when using open Wi-Fi or when using your Mac in a shared environment.<\/p>\n<p>While there are not nearly as many threats out there for Mac as there are for Windows, there is enough to put you at risk. Every year as Mac market share goes up, it becomes more interesting and potentially profitable for malware authors to focus on Mac. Targeted attacks through phishing or social engineering to a Mac user or small group of users (a business for example) will typically go undetected for much longer, increasing the chances of payout. Whether payout means the successful theft of user data or ransomware, the longer the malware can stay active and undetected, the better.<\/p>\n<p>And, for Pete&#8217;s sake, please don&#8217;t assume your Mac offers greater protection from malware than actually exists, or you could be more vulnerable as a result.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named &#8220;MacDownloader&#8221; and posing as, what else, a fake Flash Player update, the new malware\u00a0was found on the Mac of a human rights advocate and believed to originate from Iran. The malware&#8217;s code is very sloppy [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":62401,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[3259],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named &quot;MacDownloader&quot; and posing as, what\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Malware Underscores the Danger of Assumed Mac Security - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named &quot;MacDownloader&quot; and posing as, what\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-08T20:01:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-09T20:46:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg\",\"width\":400,\"height\":260,\"caption\":\"MacDownloader Underscores Assumed Mac Malware Protection\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/\",\"name\":\"New Malware Underscores the Danger of Assumed Mac Security - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#primaryimage\"},\"datePublished\":\"2017-02-08T20:01:41+00:00\",\"dateModified\":\"2017-02-09T20:46:52+00:00\",\"description\":\"This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named \\\"MacDownloader\\\" and posing as, what\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Malware Underscores the Danger of Assumed Mac Security\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"New Malware Underscores the Danger of Assumed Mac Security\",\"datePublished\":\"2017-02-08T20:01:41+00:00\",\"dateModified\":\"2017-02-09T20:46:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#webpage\"},\"wordCount\":1084,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg\",\"keywords\":[\"OSX\/MacDownloader\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named \"MacDownloader\" and posing as, what","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/","og_locale":"en_US","og_type":"article","og_title":"New Malware Underscores the Danger of Assumed Mac Security - The Mac Security Blog","og_description":"This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named \"MacDownloader\" and posing as, what","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-02-08T20:01:41+00:00","article_modified_time":"2017-02-09T20:46:52+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg","width":400,"height":260,"caption":"MacDownloader Underscores Assumed Mac Malware Protection"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/","name":"New Malware Underscores the Danger of Assumed Mac Security - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#primaryimage"},"datePublished":"2017-02-08T20:01:41+00:00","dateModified":"2017-02-09T20:46:52+00:00","description":"This week researchers found a piece of malware in the wild, built to steal passwords from the macOS keychain. Named \"MacDownloader\" and posing as, what","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Malware Underscores the Danger of Assumed Mac Security"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"New Malware Underscores the Danger of Assumed Mac Security","datePublished":"2017-02-08T20:01:41+00:00","dateModified":"2017-02-09T20:46:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#webpage"},"wordCount":1084,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg","keywords":["OSX\/MacDownloader"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/macdownloader-malware-assumed-security.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-gcD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62287"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=62287"}],"version-history":[{"count":39,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62287\/revisions"}],"predecessor-version":[{"id":62431,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62287\/revisions\/62431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/62401"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=62287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=62287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=62287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}