{"id":644,"date":"2009-01-26T12:22:28","date_gmt":"2009-01-26T11:22:28","guid":{"rendered":"http:\/\/blog.intego.com\/?p=644"},"modified":"2009-01-26T12:22:28","modified_gmt":"2009-01-26T11:22:28","slug":"new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/","title":{"rendered":"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4"},"content":{"rendered":"<p>Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the previous version, is found in pirated software distributed via BitTorrent trackers and other sites containing links to pirated software. OSX.Trojan.iServices.B Trojan horse is found bundled with copies of Adobe Photoshop CS4 for Mac. The actual Photoshop installer is clean, but the Trojan horse is found in a crack application that serializes the program. <\/p>\n<p><center><br \/>\n<img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png\"><br \/>\n<\/center><\/p>\n<p>After downloading this version of Photoshop, users will run the crack application to be able to use it. The crack application extracts an executable from its data, then installs a backdoor in \/var\/tmp\/, a directory which is not deleted when the computer is restarted. (If the user runs the crack application again, the Trojan horse creates a new executable with a different name; these random names make it harder to ensure safe removal of the malware.) <\/p>\n<p>The crack application then requests an administrator password, launching the backdoor with root privileges. This copies the executable to \/usr\/bin\/DivX, then creates a startup item in \/System\/Library\/StartupItems\/DivX. The program checks to see if it has been launched with root privileges, then saves the root hash password in the file \/var\/root\/.DivX. It listens on a random TCP port, and answers requests such as GET \/ HTTP\/1.0 by sending a 209-byte packet, and makes repeated connections to two IP addresses. <\/p>\n<p>Next, the crack application opens a disk image which is hidden in its resource folder, in a folder named .data, and proceeds to crack the Photoshop program, allowing it to be used. <\/p>\n<p><center><br \/>\n<img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-2.png\"><br \/>\n<\/center><\/p>\n<p>Since the malicious software connects to a remote server over the Internet, the creator of this malware will be alerted that this Trojan horse is installed on different Macs, and will have the ability to connect to them and perform various actions remotely. The Trojan horse may also download additional components to an infected Mac.<\/p>\n<p>For more information, see the full <a href=\"https:\/\/www.intego.com\/news\/ism0902.asp\"> Intego Security Alert <\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the previous version, is found in pirated software distributed via BitTorrent trackers and other sites containing links to pirated software. OSX.Trojan.iServices.B Trojan horse is found bundled with copies of Adobe [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-01-26T11:22:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/\",\"name\":\"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#primaryimage\"},\"datePublished\":\"2009-01-26T11:22:28+00:00\",\"dateModified\":\"2009-01-26T11:22:28+00:00\",\"description\":\"Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4\",\"datePublished\":\"2009-01-26T11:22:28+00:00\",\"dateModified\":\"2009-01-26T11:22:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#webpage\"},\"wordCount\":353,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png\",\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/","og_locale":"en_US","og_type":"article","og_title":"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4 - The Mac Security Blog","og_description":"Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-01-26T11:22:28+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/","name":"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#primaryimage"},"datePublished":"2009-01-26T11:22:28+00:00","dateModified":"2009-01-26T11:22:28+00:00","description":"Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4","datePublished":"2009-01-26T11:22:28+00:00","dateModified":"2009-01-26T11:22:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#webpage"},"wordCount":353,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-mac-trojan-horse-iservices-found-in-pirated-adobe-photoshop-cs4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iservices_b-1.png","articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ao","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/644"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=644"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/644\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}