{"id":65707,"date":"2017-05-01T16:14:14","date_gmt":"2017-05-01T23:14:14","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=65707"},"modified":"2024-05-16T12:58:28","modified_gmt":"2024-05-16T19:58:28","slug":"osxdok-can-read-encrypted-web-traffic-open-a-backdoor","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/","title":{"rendered":"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-66013\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Mac-Malware.png\" alt=\"Dok Mac Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Mac-Malware.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Mac-Malware-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Mac-Malware-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS Sierra. Once installed, OSX\/Dok\u00a0is able to intercept all of your web traffic, even that which is transmitted over HTTPS.<\/p>\n<p>Hidden alongside Dok, Intego&#8217;s malware research team found another variant of the\u00a0malware, called &#8220;Bella,&#8221; which is very similar on the surface but installs a Remote Access Trojan (RAT) on infected Macs. <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a>\u00a0with up-to-date malware definitions will detect and eradicate\u00a0each component as <strong>OSX\/Dok.A<\/strong> and <strong>OSX\/Dok.B<\/strong> respectively.<\/p>\n<h3>What is the infection vector?<\/h3>\n<p>OSX\/Dok\u00a0is spread through phishing campaigns and was\u00a0seen posing as an email with questions about tax returns, written in German. <a href=\"http:\/\/blog.checkpoint.com\/2017\/04\/27\/osx-malware-catching-wants-read-https-traffic\/\" target=\"_blank\" rel=\"noopener\">According to Check Point<\/a> researchers, OSX\/Dok mostly targets European Mac users, which we will note\u00a0appears\u00a0accurate as these phishing emails have not been reported in other languages.<\/p>\n<div id=\"attachment_65713\" style=\"width: 733px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-65713\" loading=\"lazy\" class=\"size-full wp-image-65713\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/urgent-1.png\" alt=\"\" width=\"723\" height=\"562\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/urgent-1.png 723w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/urgent-1-150x117.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/urgent-1-300x233.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/urgent-1-657x511.png 657w\" sizes=\"(max-width: 723px) 100vw, 723px\" \/><p id=\"caption-attachment-65713\" class=\"wp-caption-text\">Image credit: Check Point. Sample of the phishing email spreading the malware.<\/p><\/div>\n<p>The phishing email contains a Dokument.zip file that, when opened, shows a file named &#8220;Dokument,&#8221; which\u00a0uses an old Preview application icon that has not been used since OS X 10.9 Mavericks (and a poor quality one at that).<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-65719 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-icon-comparison.png\" alt=\"\" width=\"232\" height=\"302\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-icon-comparison.png 232w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-icon-comparison-115x150.png 115w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-icon-comparison-230x300.png 230w\" sizes=\"(max-width: 232px) 100vw, 232px\" \/><\/p>\n<p>Compared to the actual Preview app icon used up until OS X 10.9 Mavericks, you can see in the above image that the quality is very poor. To savvy Mac users, this is an instant giveaway that something is amiss. On Macs running OS X 10.10 Yosemite or newer, the icon for Preview has actually changed, so it becomes even easier to spot the fake.<\/p>\n<h3>Where does\u00a0OSX\/Dok.A install?<\/h3>\n<p>When the Dokument file is opened, a fake warning is displayed while the malware application AppStore.app is placed in the \/Users\/Shared\/ folder.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-65722 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-fake-warning.png\" alt=\"\" width=\"420\" height=\"153\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-fake-warning.png 420w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-fake-warning-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-fake-warning-300x109.png 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/p>\n<p>Now in its new location, OSX\/Dok\u00a0will execute itself and give all users on the system permission to run the malware, delete the original application copy, and then place itself in the Login Items to ensure it gets a chance to install its payload.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-65728 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Login-Item.png\" alt=\"\" width=\"460\" height=\"362\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Login-Item.png 460w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Login-Item-150x118.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Login-Item-300x236.png 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/p>\n<p>OSX\/Dok then displays a full screen message, stating that a security issue has been identified and updates are required. This window can not be moved or closed.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-65731 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates.png\" alt=\"\" width=\"1378\" height=\"1032\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates.png 1378w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates-300x225.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates-768x575.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates-1024x767.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Fake-Updates-657x492.png 657w\" sizes=\"(max-width: 1378px) 100vw, 1378px\" \/><\/p>\n<p>This fake security alert is a ploy to get your administrator password. It asks for your password when the &#8220;Update All&#8221; button is clicked. The window will stay up for about 5 minutes while in the background several changes to the system are made. These changes include the installation of brew, which in turn facilitates the installation of TOR and SOCAT. If\u00a0OSX\/Dok obtains\u00a0administrator privileges, thanks to the provided password, it grants admin privileges wherever needed without the user ever seeing a password prompt again. This is done by modifying the sudoers file.<\/p>\n<p>When Dok is done, the full screen window will close and the Login Item is removed. The login item is replaced, however, with several LaunchAgents in <em>\/Users\/*User*\/Library\/LaunchAgents<\/em>.<\/p>\n<blockquote><p>com.apple.Safari.pac.plist<br \/>\ncom.apple.Safari.proxy.plist<br \/>\nhomebrew.mxcl.tor.plist<\/p><\/blockquote>\n<p>The first two files are obviously meant to look like they belong to Apple&#8217;s Safari browser; they don&#8217;t, however. The third file might be trying to masquerade as something related to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/homebrew\/\">Homebrew<\/a>, a popular macOS package manager.<\/p>\n<p>Other system changes that are\u00a0made include a change to the Network settings to set up a proxy, and the installation of a root certificate in the System.keychain, which allows the attacker to intercept all web traffic sent through that proxy. Victims will not know that their information is being intercepted, <a href=\"http:\/\/blog.checkpoint.com\/2017\/04\/27\/osx-malware-catching-wants-read-https-traffic\/\" target=\"_blank\" rel=\"noopener\">noted<\/a> Check Point:<\/p>\n<blockquote><p>By abusing the victim\u2019s new-found trust in this bogus certificate, the attacker can impersonate any website, and the victim will be none the wiser.<\/p><\/blockquote>\n<p>The proxy setup can be viewed by opening <strong>System Preferences<\/strong> &gt; <strong>Network<\/strong> &gt; <strong>Select your active network connection<\/strong> &gt; <strong>Advanced<\/strong> &gt; <strong>Proxies<\/strong>.<\/p>\n<p><strong><img loading=\"lazy\" class=\"size-full wp-image-65737 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Proxy-Changes.png\" alt=\"\" width=\"668\" height=\"563\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Proxy-Changes.png 668w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Proxy-Changes-150x126.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Proxy-Changes-300x253.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Proxy-Changes-657x554.png 657w\" sizes=\"(max-width: 668px) 100vw, 668px\" \/><\/strong><\/p>\n<p>Open up <strong>Applications<\/strong> &gt; <strong>Utilities<\/strong> &gt; <strong>Keychain Access<\/strong>, and select the <strong>System<\/strong> keychain. There you can see the root certificate Dok installed.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-65740 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-1.png\" alt=\"\" width=\"877\" height=\"555\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-1.png 877w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-1-150x95.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-1-300x190.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-1-768x486.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-1-657x416.png 657w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/><\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-65746 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-2.png\" alt=\"\" width=\"523\" height=\"760\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-2.png 523w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-2-103x150.png 103w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Dok-Root-Cert-2-206x300.png 206w\" sizes=\"(max-width: 523px) 100vw, 523px\" \/><\/p>\n<blockquote><p>As a result of all of the above actions, when attempting to surf the web, the user\u2019s web browser will first ask the attacker web page on TOR for proxy settings. The user traffic is then redirected through a proxy controlled by the attacker, who carries out a Man-In-the-Middle attack and impersonates the various sites the user attempts to surf. The attacker is free to read the victim\u2019s traffic and tamper with it in any way they please.<\/p><\/blockquote>\n<h3>An additional surprise: OSX\/Dok.B<\/h3>\n<p>Alongside the discovery of Dok, Intego&#8217;s malware research team found another piece of malware, called &#8220;Bella,&#8221; identified by <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> as OSX\/Dok.B. While related to OSX\/Dok.A, its behavior appears to\u00a0be very different\u00a0from the other version.<\/p>\n<p>The malware comes as a .zip file, named Dokument.zip, and contains an application named Dokument. Just like the above mentioned malware, it installs an AppStore application in \/Users\/Shared\/. The application is signed with the same certificate as well. That is where the similarities end.<\/p>\n<p>OSX\/Dok.B\u00a0does not display a full screen window that claims software\u00a0updates need to be installed. Instead, it installs a backdoor named Bella, which is open-source and available on GitHub. Bella uses a Command &amp; Control (C&amp;C) server located in Russia and is capable of exfiltrating iOS backups, keychains, iMessage chat history and screenshots it makes. It&#8217;s also able to phish for passwords, capture data from your camera and microphone, and more. In short, Bella is a full fledged Remote Access Trojan (RAT) that doesn&#8217;t leave any visible traces on the infected system.<\/p>\n<p>Whereas OSX\/Dok.A modified the system&#8217;s network settings and left visible files in the user \/Library\/LaunchAgents folder, OSX\/Dok.B makes no visible changes to any system settings and the files that are placed in the library are invisible.<\/p>\n<p>The following files are placed in the User library:<\/p>\n<blockquote><p>~\/Library\/Containers\/.bella\/Bella<br \/>\n~\/Library\/Containers\/.bella\/bella.db<br \/>\n~\/Library\/LaunchAgents\/com.apple.iTunes.plist<\/p><\/blockquote>\n<p>If Bella was able to gain root access, these items will be found in the root library instead.<\/p>\n<h3>Should Mac users be concerned about OSX\/Dok?<\/h3>\n<p>At the time of writing, Apple has already revoked the developer certificate that was used to sign the malicious applications, which should avoid further infections. This kind of malware can be very dangerous as it can intercept traffic that is supposed to be secure and compromise a host of user data. Just think of what can happen if your online banking login credentials are intercepted.<\/p>\n<h3>How to tell if your Mac is infected (and removal instructions)<\/h3>\n<ul>\n<li>Open <strong>System Preferences<\/strong> &gt; <strong>Network<\/strong> &gt; <strong>Select your active network connection<\/strong> &gt; <strong>Advanced<\/strong> &gt; <strong>Proxies<\/strong>. If an automatic proxy configuration is set as shown in the image earlier in this article, your Mac was Dok&#8217;d. Uncheck the proxy, click OK and apply the changes.<\/li>\n<li>Have a look in the <strong>Users<\/strong>\/<strong>Shared<\/strong> folder. If the AppStore application is present, delete it.<\/li>\n<li>In your User folder \/Library\/LaunchAgents, look for the following files:\n<ul>\n<li>com.apple.Safari.pac.plist<\/li>\n<li>com.apple.Safari.proxy.plist<\/li>\n<li>homebrew.mxcl.tor.plist<br \/>\nIf these files are present, delete them.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>To manually check for the invisible files OSX\/Dok.B placed, you first need to make invisible files visible in the Finder. In macOS Sierra this can quickly be done with the following key combination:<\/p>\n<blockquote><p>Command-Shift-. (period)<\/p><\/blockquote>\n<p>For older OS X versions this can be done by typing the following commands in the Terminal app:<\/p>\n<blockquote><p>$ defaults write com.apple.Finder AppleShowAllFiles true<br \/>\n$ killall Finder<\/p><\/blockquote>\n<p>When done, enter the same commands but change &#8220;true&#8221; to &#8220;false&#8221;.<br \/>\nWith the hidden files now visible, check both the root library and the user library for these files:<\/p>\n<ul>\n<li>\/Containers\/.bella\/Bella<\/li>\n<li>\/Containers\/.bella\/bella.db<\/li>\n<li>\/LaunchAgents\/com.apple.iTunes.plist<\/li>\n<\/ul>\n<p>For <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego\u00a0VirusBarrier<\/a> customers, protection comes in the form of updated virus definitions, which will detect and remove all of the OSX\/Dok files. However, in order for VirusBarrier to grab these updated definitions, the proxy that was set by OSX\/Dok must be disabled first if you found yourself infected before these definitions were made available. As long as the proxy is on, VirusBarrier will not be able to contact the update servers. <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects all OSX\/Dok components as <strong>OSX\/Dok.A and OSX\/Dok.B<\/strong>.<strong><br \/>\n<\/strong><\/p>\n<h3>How to protect yourself from OSX\/Dok<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" target=\"_blank\" rel=\"noopener\">Phishing scams<\/a>\u00a0are still very popular; even with most people aware of it, the success rates are so\u00a0high that\u00a0attackers continue\u00a0using the strategy. Never open email attachments unless you were expecting that attachment and know the person it came from. If there is any doubt, call the person who\u00a0supposedly sent you the email to verify it&#8217;s real.<\/p>\n<p>OSX\/Dok shows once again how easy it is for a developer certificate to be abused, and how effective it is in bypassing macOS&#8217;s built-in Gatekeeper protection. Stay vigilant and avoid downloading every email attachment you receive, and you will minimize the risk of installing malicious software, particularly OSX\/Dok.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS Sierra. Once installed, OSX\/Dok\u00a0is able to intercept all of your web traffic, even that which is transmitted over HTTPS. Hidden alongside Dok, Intego&#8217;s malware research team found another variant of the\u00a0malware, [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":66019,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[3457,4738,3454,3460,3463],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-01T23:14:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T19:58:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png\",\"width\":400,\"height\":260,\"caption\":\"Dok Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/\",\"name\":\"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#primaryimage\"},\"datePublished\":\"2017-05-01T23:14:14+00:00\",\"dateModified\":\"2024-05-16T19:58:28+00:00\",\"description\":\"Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor\",\"datePublished\":\"2017-05-01T23:14:14+00:00\",\"dateModified\":\"2024-05-16T19:58:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#webpage\"},\"wordCount\":1528,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png\",\"keywords\":[\"Bella\",\"Homebrew\",\"OSX\/Dok\",\"OSX\/Dok.A\",\"OSX\/Dok.B\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor - The Mac Security Blog","og_description":"Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-05-01T23:14:14+00:00","article_modified_time":"2024-05-16T19:58:28+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png","width":400,"height":260,"caption":"Dok Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/","name":"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#primaryimage"},"datePublished":"2017-05-01T23:14:14+00:00","dateModified":"2024-05-16T19:58:28+00:00","description":"Security researchers last Friday discovered a new piece of Mac malware, named OSX\/Dok, that affects all versions of OS X, including the latest macOS","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"OSX\/Dok Can Read Encrypted Web Traffic, Open a Backdoor","datePublished":"2017-05-01T23:14:14+00:00","dateModified":"2024-05-16T19:58:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#webpage"},"wordCount":1528,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png","keywords":["Bella","Homebrew","OSX\/Dok","OSX\/Dok.A","OSX\/Dok.B"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osxdok-can-read-encrypted-web-traffic-open-a-backdoor\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Dok-Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-h5N","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65707"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=65707"}],"version-history":[{"count":44,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65707\/revisions"}],"predecessor-version":[{"id":100595,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65707\/revisions\/100595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/66019"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=65707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=65707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=65707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}