{"id":66124,"date":"2017-05-07T13:31:33","date_gmt":"2017-05-07T20:31:33","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=66124"},"modified":"2017-05-31T09:11:43","modified_gmt":"2017-05-31T16:11:43","slug":"handbrakes-server-compromised-download-installs-complex-trojan","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/","title":{"rendered":"Handbrake&#8217;s Server Compromised, Download Installs Complex Trojan"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-66187\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-compromised-trojan.png\" alt=\"Handbrake\u2019s Server Compromised, Download Installs Sophisticated Trojan\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-compromised-trojan.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-compromised-trojan-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-compromised-trojan-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Handbrake, a popular open source video encoder, <a href=\"https:\/\/forum.handbrake.fr\/viewtopic.php?f=33&amp;t=36364\" target=\"_blank\" rel=\"noopener noreferrer\">posted on its forums<\/a>\u00a0this weekend saying that their mirror download server was compromised. Anyone who\u00a0downloaded Handbrake between May 2 and May 6 potentially grabbed a version that was infected with malware. <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a>\u00a0anti-virus identifies and eradicates this malware as <strong>OSX\/Proton.B<\/strong>.<\/p>\n<h3>What is the infection vector?<\/h3>\n<p>Only those that downloaded Handbrake from their mirror server (download.handbrake.fr) received the malicious application. It was not distributed on any other websites.<\/p>\n<h3>How does Proton install?<\/h3>\n<p>The Handbrake application arrives in a .dmg file as expected, and upon opening the file, nothing suspicious can be seen. The user will drag Handbrake to their Applications folder and launch it.<\/p>\n<p>At this point, the application does something unusual, which will immediately stick out to long time Handbrake users:\u00a0It asks for administrator privileges. Under the guise of needing to install additional codecs, a malicious payload is installed instead.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-66130 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-admin-password.png\" alt=\"Handbrake malware install\" width=\"441\" height=\"232\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-admin-password.png 441w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-admin-password-150x79.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-admin-password-300x158.png 300w\" sizes=\"(max-width: 441px) 100vw, 441px\" \/><\/p>\n<p>Once the password is entered, Handbrake will launch and it appears to be business as usual. In the background, however, a backdoor was installed, named &#8220;activity_agent.&#8221; The backdoor was observed contacting 85.17.25.66, which is the IP address that hosts the handbrake website. The compromised server could have been used as a Command and Control (C&amp;C) server as well.<\/p>\n<p>The backdoor application activity_agents is placed in <strong>Users<\/strong> &gt; <strong>*your user*<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>RenderFiles,\u00a0<\/strong>and it is kept alive through restarts with a simple LaunchAgent.<\/p>\n<p>Keychain data, Safari stored form data, and Safari cookies are collected, compressed and stored on the system for later upload. The activity_agent does not appear\u00a0to upload or download any data during our testing. Google Chrome, Firefox, Opera and likely other browsers are raided for sensitive information.<\/p>\n<h3>Should Mac users be concerned about Proton?<\/h3>\n<p>The malicious payload runs on any Mac with OS X 10.7 or newer.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-66136 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-malicious-payload-min-osx-version.png\" alt=\"\" width=\"454\" height=\"107\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-malicious-payload-min-osx-version.png 454w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-malicious-payload-min-osx-version-150x35.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-malicious-payload-min-osx-version-300x71.png 300w\" sizes=\"(max-width: 454px) 100vw, 454px\" \/><\/p>\n<p>At the time of writing, the malware does not appear capable of uploading the sensitive user data to its server, but we should assume that it did successfully do so in the May 2-6 timeframe. Handbrake offers the following advice\u00a0in its forum post:<\/p>\n<blockquote><p>Based on the information we have, you must also change all the passwords that may reside in your OSX KeyChain or any browser password stores.<\/p><\/blockquote>\n<p>Good advice seeing as all the stored names, passwords, form data, and more, could now be in the hands of the bad guys.<\/p>\n<p>Handbrake notified Apple whom late afternoon added the signature to its XProtect database as OSX.Proton.B. Unfortunately, even with the latest XProtect update in place, Proton still installed and ran just fine, though some other researchers have\u00a0reported that XProtect did in fact stop the DMG from being opened. However, without a server to offload its collected data to, it is currently not a major\u00a0threat.<\/p>\n<p>What is worrying, however, is the way the attackers went about this. As with Transmission, not <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-hit-by-rare-ransomware-attack-spread-via-transmission-bittorrent-app\/\" target=\"_blank\" rel=\"noopener noreferrer\">once<\/a> but <a href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-spreads-through-modified-transmission-application-again\/\" target=\"_blank\" rel=\"noopener noreferrer\">twice<\/a>, the download server was compromised and the application available for download was replaced with a malicious one. Going after servers, which are typically not updated or patched as often as they should be, will result in less users downloading your malware, but the fact that it comes from a trusted source will make those users not suspicious at all. If a user is not suspicious, they won&#8217;t go looking for malware, and malware that goes undetected longer is typically more successful.<\/p>\n<p>If this becomes a trend, and even the servers of the trusted source can no longer be trusted, we may very well be in trouble.<\/p>\n<p>One way to verify if the file you downloaded is the real deal, is by comparing checksums. In Handbrake&#8217;s case, they maintain <a href=\"https:\/\/handbrake.fr\/checksums.php\" target=\"_blank\" rel=\"noopener noreferrer\">a page that lists all the checksums<\/a> for available downloads, so anyone can verify the download is compromised. In reality, very few people actually do this, and a lot of websites that distribute software don&#8217;t even offer these checksums for you to verify. Apple used to offer these checksums on their <a href=\"https:\/\/support.apple.com\/downloads\/\" target=\"_blank\" rel=\"noopener noreferrer\">downloads page<\/a>, but has since stopped doing so as well.<\/p>\n<p>For websites that do offer these checksums, verification is easy. Open the Terminal application (Applications &gt; Utilities) and type the following (include a space at the end):<\/p>\n<pre>openssl sha1<\/pre>\n<p>Now, simply drag and drop the downloaded file onto the Terminal window and hit enter. In the case of the malicious Handbrake download, this is the result:<\/p>\n<pre>intego$ openssl sha1 \/Users\/intego\/Desktop\/HandBrake-1.0.7.dmg\r\nSHA1(\/Users\/intego\/Desktop\/HandBrake-1.0.7.dmg)= 0935a43ca90c6c419a49e4f8f1d75e68cd70b274<\/pre>\n<p>According to the Handbrake website the SHA1 checksum for this download should be &#8220;75c6204d7bd7d9c6e5b1fedb56697ae2f3857789,&#8221; they clearly do not match up. If any user got infected with Proton through Handbrake, they did not run this simple security check.<\/p>\n<h3>How to tell if your Mac is infected (and removal instructions)<\/h3>\n<p>Open Activity Monitor and search for a process named &#8220;Activity_agent.&#8221; If this process is running, your Mac is infected.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-66145\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Handbrake-activity-monitor.png\" alt=\"\" width=\"595\" height=\"111\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Handbrake-activity-monitor.png 595w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Handbrake-activity-monitor-150x28.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Handbrake-activity-monitor-300x56.png 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/p>\n<p>Click the process, and then close it with the X button in the menu bar.<\/p>\n<p>To clear the infection off your Mac, browse to the following folders and trash the following files:<\/p>\n<ul>\n<li><strong>Applications<\/strong> &#8211; Delete the Handbrake application.<\/li>\n<li><strong>Users<\/strong> &gt; <strong>*you*<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>VideoFrameworks<\/strong> &#8211; Delete this folder and everything in it<\/li>\n<li><strong>Users<\/strong> &gt; <strong>*you*<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>RenderFiles<\/strong> &#8211; Delete the activity_agent application<\/li>\n<li><strong>Users<\/strong> &gt; <strong>*you*<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>LaunchAgents<\/strong> &#8211; Delete &#8220;<em>fr.handbrake.activity_agent.plist<\/em>&#8221; and &#8220;<em>fr.handbrake.activity_agent.plist-e<\/em>&#8220;<\/li>\n<li><strong>Users<\/strong> &gt; <strong>*you*<\/strong> &gt; <strong>Library<\/strong> &gt; <strong>Caches<\/strong> &gt; <strong>fr.handbrake.activity_agent<\/strong> &#8211; Delete the folder<\/li>\n<\/ul>\n<p>With those files deleted, empty the trash and restart your Mac. Double-check the same locations again after the restart to ensure the infection is indeed cleared. If a warning shows that some items cannot be deleted, because they are in use, you&#8217;ll be able to empty the trash after the restart.<\/p>\n<p>For Intego&#8217;s Mac anti-virus\u00a0customers, protection comes in the form of updated malware\u00a0definitions, which will detect and remove all of the Proton files. Proton components are detected by <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> as\u00a0<strong>OSX\/Proton.B<\/strong>.<\/p>\n<h3>How to protect yourself from Proton<\/h3>\n<p>When the official server of the trusted source has been compromised, and the malware is coded to act much like the real application, there is very little to warn you something is amiss. Verifying your downloads will be the only way you can be sure the download was not compromised. Using the built-in updater, if an application provides one, is typically the best way to receive updates for an application.<\/p>\n<p>There is much still to be discovered about Proton.B as it is far more complex than it appears.\u00a0<strong>This malware\u00a0is still under investigation and as new details emerge we will update this story.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Handbrake, a popular open source video encoder, posted on its forums\u00a0this weekend saying that their mirror download server was compromised. Anyone who\u00a0downloaded Handbrake between May 2 and May 6 potentially grabbed a version that was infected with malware. Intego VirusBarrier\u00a0anti-virus identifies and eradicates this malware as OSX\/Proton.B. What is the infection vector? Only those that [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":66208,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[2362,3466,3469],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Handbrake, a popular open source video encoder, posted on its forums\u00a0this weekend saying that their mirror download server was compromised. Anyone\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Handbrake&#039;s Server Compromised, Download Installs Complex Trojan - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Handbrake, a popular open source video encoder, posted on its forums\u00a0this weekend saying that their mirror download server was compromised. Anyone\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-07T20:31:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-31T16:11:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png\",\"width\":400,\"height\":260,\"caption\":\"Handbrake Proton Trojan\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/\",\"name\":\"Handbrake's Server Compromised, Download Installs Complex Trojan - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#primaryimage\"},\"datePublished\":\"2017-05-07T20:31:33+00:00\",\"dateModified\":\"2017-05-31T16:11:43+00:00\",\"description\":\"Handbrake, a popular open source video encoder, posted on its forums\\u00a0this weekend saying that their mirror download server was compromised. Anyone\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Handbrake&#8217;s Server Compromised, Download Installs Complex Trojan\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Handbrake&#8217;s Server Compromised, Download Installs Complex Trojan\",\"datePublished\":\"2017-05-07T20:31:33+00:00\",\"dateModified\":\"2017-05-31T16:11:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#webpage\"},\"wordCount\":1111,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png\",\"keywords\":[\"Handbrake\",\"OSX\/Proton.B\",\"Proton\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Handbrake, a popular open source video encoder, posted on its forums\u00a0this weekend saying that their mirror download server was compromised. Anyone","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/","og_locale":"en_US","og_type":"article","og_title":"Handbrake's Server Compromised, Download Installs Complex Trojan - The Mac Security Blog","og_description":"Handbrake, a popular open source video encoder, posted on its forums\u00a0this weekend saying that their mirror download server was compromised. Anyone","og_url":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-05-07T20:31:33+00:00","article_modified_time":"2017-05-31T16:11:43+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png","width":400,"height":260,"caption":"Handbrake Proton Trojan"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/","name":"Handbrake's Server Compromised, Download Installs Complex Trojan - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#primaryimage"},"datePublished":"2017-05-07T20:31:33+00:00","dateModified":"2017-05-31T16:11:43+00:00","description":"Handbrake, a popular open source video encoder, posted on its forums\u00a0this weekend saying that their mirror download server was compromised. Anyone","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Handbrake&#8217;s Server Compromised, Download Installs Complex Trojan"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Handbrake&#8217;s Server Compromised, Download Installs Complex Trojan","datePublished":"2017-05-07T20:31:33+00:00","dateModified":"2017-05-31T16:11:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#webpage"},"wordCount":1111,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png","keywords":["Handbrake","OSX\/Proton.B","Proton"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/handbrakes-server-compromised-download-installs-complex-trojan\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/handbrake-trojan-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hcw","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/66124"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=66124"}],"version-history":[{"count":27,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/66124\/revisions"}],"predecessor-version":[{"id":66760,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/66124\/revisions\/66760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/66208"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=66124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=66124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=66124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}