{"id":63157,"date":"2017-02-24T09:29:58","date_gmt":"2017-02-24T17:29:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=63157"},"modified":"2017-03-02T09:39:17","modified_gmt":"2017-03-02T17:39:17","slug":"month-in-review-apple-security-in-february-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/","title":{"rendered":"Month in Review: Apple Security in February 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-63265\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/month-in-security-february-2017.jpg\" alt=\"Month in Review: Apple Security in February 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/month-in-security-february-2017.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/month-in-security-february-2017-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/month-in-security-february-2017-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new malware designed to infect Macs.<\/p>\n<h3>New Mac Malware:\u00a0Filecoder\/Findzip Ransomware<\/h3>\n<p><img loading=\"lazy\" class=\"alignright wp-image-63073 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Patcher-start-window-300x244.jpg\" width=\"300\" height=\"244\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Patcher-start-window-300x244.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Patcher-start-window-150x122.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Patcher-start-window.jpg 510w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Yesterday the story broke that a new ransomware Trojan horse affecting Macs is out there in the wild. Called <strong>OSX\/Filecoder<\/strong> by Intego and <strong>OSX.Findzip.A<\/strong> by Apple, the malware masquerades as a &#8220;patcher&#8221; or cracking tool for\u00a0illegally unlocking unlicensed copies of Adobe Premiere Pro CC or Microsoft Office 2016.<\/p>\n<p>Whilst the Trojan horse app\u00a0pretends to do some mysterious\u00a0cracking magic, instead it\u00a0surreptitiously encrypts all of the user&#8217;s documents, after which read-me files are dropped onto the desktop requesting payment of a multi-hundred dollar ransom to recover the\u00a0user&#8217;s files.<\/p>\n<p>Check out Intego&#8217;s write-up for more details:\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/patcher-ransomware-attacks-macos-encrypts-files-permanently\/\" target=\"_blank\">Patcher Ransomware Attacks macOS, Encrypts Files Permanently<\/a>.<\/p>\n<h3>New Mac Malware: Sofacy XAgent<\/h3>\n<p>The biggest buzz in Mac malware this month involved a backdoor associated with a group known variously as Sofacy, APT28, and Fancy Bear. The malware itself is dubbed <strong>OSX\/Sofacy.gen<\/strong> by Intego, and <strong>OSX.XAgent.A<\/strong> by Apple. If a Mac has previously been infected by Sofacy&#8217;s malware known as Komplex, that malware may download and install XAgent as a secondary infection.<\/p>\n<p><img loading=\"lazy\" class=\"wp-image-62773 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Xagent-detection.png\" width=\"500\" height=\"221\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Xagent-detection.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Xagent-detection-150x66.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Xagent-detection-300x133.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects Sofacy XAgent<\/p>\n<p>XAgent includes functions to allow an attacker to do just about anything with your Mac, including but not limited to logging everything you type (including your passwords), automatically taking a screenshot every ten seconds, stealing iPhone and\u00a0iPad backups, and accessing the command shell (effectively equivalent to typing commands into your Mac&#8217;s Terminal app).<\/p>\n<p>For further details on this malware, see Intego&#8217;s article:\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/komplex-malware-the-return-of-sofacys-xagent\/\" target=\"_blank\">Komplex Malware: The Return of Sofacy&#8217;s XAgent<\/a>.<\/p>\n<h3>New Mac Malware: iKittens<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-63208\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc-300x229.png\" alt=\"\" width=\"300\" height=\"229\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc-300x229.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc-150x115.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc-768x587.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc-1024x783.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc-657x502.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/iKitten-bait-utc.png 1066w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Earlier this month, a <a href=\"https:\/\/iranthreats.github.io\/resources\/macdownloader-macos-malware\/\" target=\"_blank\">report<\/a> was published describing Mac malware called <strong>MacDownloader<\/strong> or <strong>OSX.iKitten.A<\/strong>. The malware was targeted at the United States defense industry, and was distributed through a site that impersonated an aerospace firm (as depicted in the screenshot; image credit: <a href=\"https:\/\/iranthreats.github.io\/resources\/macdownloader-macos-malware\/\" target=\"_blank\">Iran Threats<\/a>).<\/p>\n<p>The deceptive page pushes a fake Flash Player installer that infects the victim&#8217;s Mac\u00a0with iKitten malware, after which iKitten\u00a0attempts to upload a copy of the user&#8217;s\u00a0Keychain (which contains a user&#8217;s saved passwords) to a site maintained by the malware developer.<\/p>\n<p>The malware itself is poorly written and doesn&#8217;t seem to persist in memory after a reboot, but by the time a user reboots their system, their\u00a0passwords may have already been stolen.<\/p>\n<h3>New Mac Malware: EmPyre Word Macro<\/h3>\n<p>If you&#8217;ve been around long enough, you may remember hearing about Microsoft Office macro viruses nearly two decades ago. Around that time, Word and Excel macro viruses (that is,\u00a0Microsoft Office documents containing malicious scripts that automatically execute predefined actions) had started to become a cross-platform threat, but in recent years we haven&#8217;t heard much about macro viruses.<\/p>\n<p>Well, don&#8217;t count out macro viruses just yet, because at least one malware developer has gone retro!<\/p>\n<p><img loading=\"lazy\" class=\"wp-image-63217 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Word-macro-warning.png\" width=\"521\" height=\"249\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Word-macro-warning.png 521w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Word-macro-warning-150x72.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Word-macro-warning-300x143.png 300w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/><\/p>\n<p style=\"text-align: center;\">Image credit: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x17.html\" target=\"_blank\">Patrick Wardle<\/a><\/p>\n<p>A file named &#8220;U.S. Allies and Rivals Digest Trump\u2019s Victory &#8211; Carnegie Endowment for International Peace.docm&#8221; recently circulated that contained a <strong>Microsoft Word macro<\/strong>\u00a0(as indicated by the .doc<strong>m<\/strong> filename extension) which contained\u00a0<strong>EmPyre<\/strong> malicious code.<\/p>\n<p>If a user attempts to open the file, Word will present a dialog box stating that the document contains macros (and in fine print it states that &#8220;Macros may contain viruses that could be harmful to your computer&#8221;).<\/p>\n<p>If the\u00a0user ignores the warning and\u00a0carelessly clicks on the (non-default) button &#8220;Enable Macros&#8221; (as seen in the screenshot above), their Mac could become infected with additional malware. For more details, see\u00a0<a href=\"https:\/\/objective-see.com\/blog\/blog_0x17.html\" target=\"_blank\">Patrick Wardle&#8217;s write-up<\/a>.<\/p>\n<h3>New Mac Malware: PROTON RAT<\/h3>\n<p>Reports circulated in early February about a new remote access Trojan (RAT), called <strong>PROTON<\/strong> (<strong>OSX.Proton.A<\/strong>), found on a Russian cybercrime message board. The RAT was\u00a0reportedly available for other would-be criminals to purchase for their own targeted campaigns,\u00a0and even offered to\u00a0add an Apple-approved developer signature to the attacker&#8217;s\u00a0custom RAT software\u00a0in order to bypass Apple&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/gatekeeper\/\" target=\"_blank\">Gatekeeper<\/a> protection on the victim&#8217;s Mac.<\/p>\n<p>After\u00a0deploying\u00a0the RAT onto a victim&#8217;s Mac, an\u00a0attacker could allegedly gain complete remote access, including viewing the user&#8217;s screen in real time, recording keystrokes, uploading the victim&#8217;s\u00a0files, downloading additional malware, accessing the webcam, issuing shell commands, and\u00a0other nefarious things. More information can be found in this <a href=\"https:\/\/www.cybersixgill.com\/wp-content\/uploads\/2017\/02\/02072017%20-%20Proton%20-%20A%20New%20MAC%20OS%20RAT%20-%20Sixgill%20Threat%20Report.pdf\" target=\"_blank\">PDF report<\/a>\u00a0published by Sixgill (their accompanying <a href=\"https:\/\/www.cybersixgill.com\/proton-a-new-mac-os-rat\/\" target=\"_blank\">blog post<\/a>\u00a0was offline at the time of this article&#8217;s publication).<\/p>\n<h3>iCloud Was Storing &#8220;Deleted&#8221; Safari History<\/h3>\n<p>Forbes <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/02\/09\/apple-safari-web-history-deleted-stored-icloud\/\" target=\"_blank\">broke the story<\/a> that a company in Russia had developed a tool, called Phone Breaker, that could recover (ostensibly) deleted Safari browser history as far back as November 2015. The tool&#8217;s functionality was independently confirmed by a Forbes source.<\/p>\n<p><img loading=\"lazy\" class=\"wp-image-63250 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Elcomsoft-Phone-Breaker-Screen-Shot.jpg\" width=\"614\" height=\"384\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Elcomsoft-Phone-Breaker-Screen-Shot.jpg 960w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Elcomsoft-Phone-Breaker-Screen-Shot-150x94.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Elcomsoft-Phone-Breaker-Screen-Shot-300x188.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Elcomsoft-Phone-Breaker-Screen-Shot-768x480.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Elcomsoft-Phone-Breaker-Screen-Shot-657x411.jpg 657w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/p>\n<p style=\"text-align: center;\">Phone Breaker screen shot. Image credit: <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/02\/09\/apple-safari-web-history-deleted-stored-icloud\/\" target=\"_blank\">Forbes<\/a><\/p>\n<p>Apple did not respond to Forbes&#8217; media inquiry, but shortly after the article was published, old browsing history records began disappearing from iCloud accounts that were known to have been affected.<\/p>\n<p>Since Apple was\u00a0tight-lipped about the ordeal, one can only speculate, but it&#8217;s possible that in late 2015 Apple either made a programming error that caused Safari history to no longer get deleted and has now corrected the issue on the back end, or perhaps Apple has yet to fix the underlying issue and has started proactively deleting old history backups while working on a more permanent fix.<\/p>\n<h3>Apple Security Updates<\/h3>\n<p>Apple has released <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\">security updates<\/a> for the following software this month:<\/p>\n<ul>\n<li><strong>GarageBand 10.1.6<\/strong> (available for Macs running macOS Sierra, OS X El Capitan, or OS X Yosemite) fixes a vulnerability described in a single CVE (Common Vulnerabilities and Exposures) ID, preventing maliciously crafted files from causing arbitrary code execution (i.e. doing bad stuff to your Mac) \u2014\u00a0If that sounds familiar, it&#8217;s because a similar bug discovered by the same security researcher was just patched last month<\/li>\n<li><strong>Logic Pro X 10.3.1<\/strong> (available for Macs running Sierra or El Capitan) fixes the same vulnerability that was patched in this month&#8217;s GarageBand update<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"alignright wp-image-63247\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-remote-desktop-app-icon-ARD-300x300.png\" alt=\"\" width=\"140\" height=\"140\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-remote-desktop-app-icon-ARD-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-remote-desktop-app-icon-ARD-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-remote-desktop-app-icon-ARD-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-remote-desktop-app-icon-ARD-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-remote-desktop-app-icon-ARD.png 894w\" sizes=\"(max-width: 140px) 100vw, 140px\" \/>Apple also <a href=\"https:\/\/support.apple.com\/en-us\/HT206178\" target=\"_blank\">released updates<\/a> for the <strong>Apple Remote Desktop Client<\/strong> and <strong>Apple Remote Desktop Admin<\/strong> software (both of which are available for Macs running Sierra, El Capitan, or Yosemite), vaguely mentioning that the new Admin app offers &#8220;Improved security, with an optional compatibility option to support older clients in the Security tab of the Preferences panel.&#8221;<\/p>\n<p>When asked to\u00a0comment on the security improvements, an Apple representative responded with the following details:<\/p>\n<ul>\n<li>ARD clients in Sierra and the ARD console now use the Secure Remote Password (SRP) protocol for authentication where possible.<\/li>\n<li>The Diffie-Hellman key size for encryption has been increased to 2048 bits.<\/li>\n<\/ul>\n<p>Apple also uses the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Secure_Remote_Password_protocol\" target=\"_blank\">SRP protocol<\/a> for communications between mobile\u00a0devices running\u00a0iOS 9.3 or later and HomeKit accessories, according to <a href=\"https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf\" target=\"_blank\">this Apple white paper (PDF)<\/a>.<\/p>\n<h3>Alleged Nude Celebrity Photo Leak Blamed on &#8220;iCloud Hack&#8221;<\/h3>\n<div id=\"attachment_63238\" style=\"width: 160px\" class=\"wp-caption alignleft\"><img aria-describedby=\"caption-attachment-63238\" loading=\"lazy\" class=\"wp-image-63238\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Ratajkowski-300x300.jpg\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Ratajkowski-300x300.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Ratajkowski-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/Ratajkowski.jpg 536w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><p id=\"caption-attachment-63238\" class=\"wp-caption-text\">Image credit: <a href=\"http:\/\/www.imdb.com\/name\/nm1589279\/mediaviewer\/rm4116971520\" target=\"_blank\">IMDb<\/a><\/p><\/div>\n<p>Various celebrity gossip sites reported earlier this week that model\/actress Emily Ratajkowski had allegedly fallen victim to a cyberattack,\u00a0and that\u00a0naked pictures of her were stolen\u00a0from her\u00a0iCloud account.<\/p>\n<p>A salacious someone who allegedly was in possession of\u00a0those photos\u00a0reportedly attempted to convince\u00a0a gossip columnist to\u00a0publish the photos online.<\/p>\n<p>The gossip columnist\u2014who, by the way, seems to be the sole source for the story\u2014declined to publish the pictures.<\/p>\n<p>No details about the alleged hack have been published, but the story brings to mind a similar <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\" target=\"_blank\">alleged &#8220;iCloud hack&#8221;\u00a0celebrity photo leak<\/a>\u00a0that we reported on in 2014.<\/p>\n<p>In this case, it&#8217;s quite probable\u00a0that the attacker simply guessed or phished\u00a0Ratajkowski&#8217;s password\u2014assuming that the story is even authentic. There is no evidence to suggest that Apple&#8217;s iCloud servers were compromised.<\/p>\n<h3>RSA Conference<\/h3>\n<p><img loading=\"lazy\" class=\"wp-image-63244 alignright\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/RSAConference-2017-stacked-transparent-300x139-300x139.png\" alt=\"\" width=\"123\" height=\"57\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/RSAConference-2017-stacked-transparent-300x139.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/RSAConference-2017-stacked-transparent-300x139-150x70.png 150w\" sizes=\"(max-width: 123px) 100vw, 123px\" \/>Last week I attended <strong>RSA Conference<\/strong>, an annual cybersecurity conference held in San Francisco at (and around) the Moscone Center.\u00a0We&#8217;ll publish a separate article very soon covering some highlights\u2014there&#8217;s some great stuff that you won&#8217;t want to miss.<\/p>\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>There&#8217;s more to come.\u00a0Be sure to subscribe to <strong>The Mac Security Blog<\/strong> to catch our RSA Conference coverage, and of course to stay informed about Apple security throughout each month.<\/p>\n<p>If you missed Intego&#8217;s other recent Apple security news roundups or our\u00a0security predictions for 2017, you can check them out here:<\/p>\n<blockquote data-secret=\"nlhCIPk2qP\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-january-2017\/\">Month in Review: Apple Security in January 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-january-2017\/embed\/#?secret=nlhCIPk2qP\" data-secret=\"nlhCIPk2qP\" width=\"500\" height=\"282\" title=\"&#8220;Month in Review: Apple Security in January 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote data-secret=\"t6xy480Ia8\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/\">Apple Security Trends: What to Expect in 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/embed\/#?secret=t6xy480Ia8\" data-secret=\"t6xy480Ia8\" width=\"500\" height=\"282\" title=\"&#8220;Apple Security Trends: What to Expect in 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote data-secret=\"fKjVKO5asU\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\">The Year in Mac Security 2016<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/embed\/#?secret=fKjVKO5asU\" data-secret=\"fKjVKO5asU\" width=\"500\" height=\"282\" title=\"&#8220;The Year in Mac Security 2016&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new malware designed to infect Macs. New Mac Malware:\u00a0Filecoder\/Findzip Ransomware Yesterday the story broke that a new ransomware Trojan horse affecting Macs is out there in the wild. Called OSX\/Filecoder by Intego and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":63271,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3289,3133,3250,3295,3283,3298,1948],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in Review: Apple Security in February 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-24T17:29:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-02T17:39:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Security February 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\",\"name\":\"Month in Review: Apple Security in February 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#primaryimage\"},\"datePublished\":\"2017-02-24T17:29:58+00:00\",\"dateModified\":\"2017-03-02T17:39:17+00:00\",\"description\":\"Another month, another round of Apple\\u00a0security news. Like last month, February has certainly\\u00a0kept the news coming\\u2014this time including a tidal wave of new\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in Review: Apple Security in February 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in Review: Apple Security in February 2017\",\"datePublished\":\"2017-02-24T17:29:58+00:00\",\"dateModified\":\"2017-03-02T17:39:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#webpage\"},\"wordCount\":1413,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg\",\"keywords\":[\"Filecoder\",\"Komplex\",\"Month in Security\",\"OSX.Proton.A\",\"Patcher\",\"RSA Conference\",\"XAgent\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/","og_locale":"en_US","og_type":"article","og_title":"Month in Review: Apple Security in February 2017 - The Mac Security Blog","og_description":"Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-02-24T17:29:58+00:00","article_modified_time":"2017-03-02T17:39:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg","width":400,"height":260,"caption":"Apple Security February 2017"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/","name":"Month in Review: Apple Security in February 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#primaryimage"},"datePublished":"2017-02-24T17:29:58+00:00","dateModified":"2017-03-02T17:39:17+00:00","description":"Another month, another round of Apple\u00a0security news. Like last month, February has certainly\u00a0kept the news coming\u2014this time including a tidal wave of new","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in Review: Apple Security in February 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in Review: Apple Security in February 2017","datePublished":"2017-02-24T17:29:58+00:00","dateModified":"2017-03-02T17:39:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#webpage"},"wordCount":1413,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg","keywords":["Filecoder","Komplex","Month in Security","OSX.Proton.A","Patcher","RSA Conference","XAgent"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/apple-security-february-2017.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-gqF","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63157"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=63157"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63157\/revisions"}],"predecessor-version":[{"id":63289,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63157\/revisions\/63289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/63271"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=63157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=63157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=63157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}