{"id":66247,"date":"2017-05-10T14:10:42","date_gmt":"2017-05-10T21:10:42","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=66247"},"modified":"2018-04-25T11:44:52","modified_gmt":"2018-04-25T18:44:52","slug":"snake-malware-ported-from-windows-to-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/","title":{"rendered":"Snake Malware Ported from Windows to Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignright wp-image-66703\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware.png\" alt=\"Snake Malware\" width=\"215\" height=\"219\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware.png 628w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware-147x150.png 147w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware-294x300.png 294w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/snake-malware-64x64.png 64w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/><\/p>\n<p><a href=\"https:\/\/blog.fox-it.com\/2017\/05\/03\/snake-coming-soon-in-mac-os-x-flavour\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fox IT discovered<\/a> a macOS version of &#8220;Snake&#8221; malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a complex framework used for targeted attacks. Ported from Windows to Mac, Snake malware is\u00a0a trojan horse presented as a Flash Player update installer; if installed, Snake opens a backdoor on the infected Mac.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> identifies and eradicates this trojan horse malware as <strong>OSX\/Snake<\/strong>.<\/p>\n<p>The Windows malware variant includes the ability to detect analysis tools like\u00a0wireshark and tcpdump, and it will not run if processes are active. On the Mac, this detection evasion system is not present.<\/p>\n<p>Trojans are used by malware authors so as\u00a0to create a backdoor\u00a0on\u00a0an infected system, typically to exfiltrate data from the infected machine. With\u00a0Snake for macOS, we can assume data is copied from the system, but whether this means files with a certain extension, screenshots, microphone or camera data is unclear at this time.<\/p>\n<h3>What is the infection vector?<\/h3>\n<p>Infection vector is\u00a0currently unknown, however, phishing and spear phishing attacks are the most likely distribution methods. Snake&#8217;s Windows counterpart have been found in government institutions, military and large corporations, in the past. These are very specific targets, so running into this on a random website is unlikely at this time. That said, the macOS version of Snake is believed to be so new that it may not have been actively used yet. The author may continue\u00a0focus on the same high profile targets or could just let loose on the Web, making <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" target=\"_blank\">BitTorrent sites<\/a> a likely candidate as fake Flash Player pop-ups are the norm there.<\/p>\n<p>At the time the installer was signed with a valid Developer ID, under the name <b class=\"\">Addy Symonds<\/b>. This ID has since been revoked by Apple.<\/p>\n<h3>How and where does Snake install?<\/h3>\n<p>The malware ends up on a system in the form of a zip file, named &#8220;Install Adobe Flash Player.app.zip.&#8221; When opened, a Flash Player installer application will appear. Upon opening the application, the user will be\u00a0immediately presented with the request for an administrator password.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-66253 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-password-prompt.png\" alt=\"\" width=\"555\" height=\"344\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-password-prompt.png 555w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-password-prompt-150x93.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-password-prompt-300x186.png 300w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><\/p>\n<p>Once the password is provided, the installation will begin and the process will look\u00a0similar to\u00a0the real thing.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-66259 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-installer.png\" alt=\"\" width=\"732\" height=\"489\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-installer.png 732w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-installer-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-installer-300x200.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-installer-657x439.png 657w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/p>\n<p>This is because, in part, it is the real thing. Flash Player is actually installed on the system, but not before the following files are dropped on the now infected Mac:<\/p>\n<pre>\/Library\/Scripts\/queue\r\n\/Library\/Scripts\/installdp\r\n\/Library\/Scripts\/installd.sh\r\n\/Library\/LaunchDaemons\/com.adobe.update.plist<\/pre>\n<p>The process &#8220;installdp&#8221; provides the backdoor to those on the other end of the Command &amp; Control (C&amp;C) server. Flash Player itself does not appear to be tampered with, but the usual vulnerabilities can be expected of it.<\/p>\n<p>Several invisible files are installed as well, detailed below.<\/p>\n<h3>Should Mac users be concerned about Snake?<\/h3>\n<p>B aware of the way in which Snake\u00a0infects a system. It uses a real looking installer and is carefully crafted code. We recently saw <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\" rel=\"noopener noreferrer\">SilverInstaller<\/a>\u00a0utilizing\u00a0the Mac malware and also employed\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\" target=\"_blank\" rel=\"noopener noreferrer\">new techniques<\/a>.\u00a0For years, Intego has speculated\u00a0Mac malware would\u00a0steadily evolve and become more sophisticated.\u00a0And now with malware authors having\u00a0porting tried and true, sophisticated Windows malware over to the Mac, we believe this evolution process is sped up significantly.<\/p>\n<p>macOS is currently able to thwart malware in ways that do not allow it\u00a0to reach their full potential, but malware authors will likely find ways to deal with this. Snake runs on OS X 10.10 Yosemite, 10.11 El Capitan and macOS 10.12 Sierra.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-66265 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-min-OSX-version.png\" alt=\"\" width=\"425\" height=\"103\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-min-OSX-version.png 425w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-min-OSX-version-150x36.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/05\/Snake-min-OSX-version-300x73.png 300w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/><\/p>\n<h3>How to tell if your Mac is infected (and removal instructions)<\/h3>\n<p>As mentioned previously, these files are placed on the system during installation:<\/p>\n<pre>\/Library\/Scripts\/queue\r\n\/Library\/Scripts\/installdp\r\n\/Library\/Scripts\/installd.sh\r\n\/Library\/LaunchDaemons\/com.adobe.update.plist<\/pre>\n<p>If these files are present, delete them and restart your Mac.<\/p>\n<p>The following files are also placed:<\/p>\n<pre>\/var\/tmp\/.ur-*\r\n\/tmp\/.gdm-socket\r\n\/tmp\/.gdm-selinux<\/pre>\n<p>The .gdm- files are sockets and facilitate the communication between different processes. To gain access to the \/var and \/tmp folders, you&#8217;ll have to make them visible first as macOS hides them by default. Making invisible folders visible has the added advantage of being able to see the socket files as well, because those too are hidden with the period preceding their name.<\/p>\n<p>In macOS Sierra this can quickly be done with the following key combination:<\/p>\n<blockquote><p>Command-Shift-. (period)<\/p><\/blockquote>\n<p>For older OS X versions this can be done by typing the following commands in the Terminal app:<\/p>\n<blockquote><p>$ defaults write com.apple.Finder AppleShowAllFiles true<br \/>\n$ killall Finder<\/p><\/blockquote>\n<p>If present, delete the files and restart your Mac. When done, enter the same commands but change &#8220;true&#8221; to &#8220;false.&#8221;<\/p>\n<p>For <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> customers\u00a0with up-to-date\u00a0virus definitions, the antivirus software will\u00a0detect and remove all Snake files, identified\u00a0as <b class=\"\">OSX\/Snake.A<\/b>.<\/p>\n<h3>How to protect yourself from Snake<\/h3>\n<p>Anything involving Flash Player should throw up a big red flag these days. There are just too many\u00a0fake Flash Player installers out there, and these\u00a0trojan horse scams may trick you into installing malware.<\/p>\n<p>Be vigilant when opening email attachments or with clicking on any pop-ups asking you to install something, which you may see while browsing the Web. If it is software you happen to be interested in, get it straight from the source instead of from that third-party popup window.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fox IT discovered a macOS version of &#8220;Snake&#8221; malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a complex framework used for targeted attacks. Ported from Windows to Mac, Snake malware is\u00a0a trojan horse presented as a Flash Player update installer; if installed, Snake opens a backdoor on [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":8763,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[174,3502,4099,4102,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Fox IT discovered a macOS version of &quot;Snake&quot; malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Snake Malware Ported from Windows to Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Fox IT discovered a macOS version of &quot;Snake&quot; malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-10T21:10:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-04-25T18:44:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/\",\"name\":\"Snake Malware Ported from Windows to Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#primaryimage\"},\"datePublished\":\"2017-05-10T21:10:42+00:00\",\"dateModified\":\"2018-04-25T18:44:52+00:00\",\"description\":\"Fox IT discovered a macOS version of \\\"Snake\\\" malware, a nearly decade old Windows malware,\\u00a0also known as Turla, Uroburos and Agent.BTZ, and\\u00a0said to be a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Snake Malware Ported from Windows to Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Snake Malware Ported from Windows to Mac\",\"datePublished\":\"2017-05-10T21:10:42+00:00\",\"dateModified\":\"2018-04-25T18:44:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#webpage\"},\"wordCount\":860,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Mac\",\"OSX\/Snake\",\"OSX\/Snake.A\",\"Snake\",\"Windows\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Fox IT discovered a macOS version of \"Snake\" malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/","og_locale":"en_US","og_type":"article","og_title":"Snake Malware Ported from Windows to Mac - The Mac Security Blog","og_description":"Fox IT discovered a macOS version of \"Snake\" malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a","og_url":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-05-10T21:10:42+00:00","article_modified_time":"2018-04-25T18:44:52+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/","name":"Snake Malware Ported from Windows to Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#primaryimage"},"datePublished":"2017-05-10T21:10:42+00:00","dateModified":"2018-04-25T18:44:52+00:00","description":"Fox IT discovered a macOS version of \"Snake\" malware, a nearly decade old Windows malware,\u00a0also known as Turla, Uroburos and Agent.BTZ, and\u00a0said to be a","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Snake Malware Ported from Windows to Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Snake Malware Ported from Windows to Mac","datePublished":"2017-05-10T21:10:42+00:00","dateModified":"2018-04-25T18:44:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#webpage"},"wordCount":860,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Mac","OSX\/Snake","OSX\/Snake.A","Snake","Windows"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hev","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/66247"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=66247"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/66247\/revisions"}],"predecessor-version":[{"id":77908,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/66247\/revisions\/77908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=66247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=66247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=66247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}