{"id":666,"date":"2009-02-10T16:44:04","date_gmt":"2009-02-10T15:44:04","guid":{"rendered":"http:\/\/blog.intego.com\/?p=666"},"modified":"2009-02-10T16:44:04","modified_gmt":"2009-02-10T15:44:04","slug":"mapping-the-spread-of-the-rsplug-trojan-horse","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/","title":{"rendered":"Mapping the Spread of the RSPlug Trojan Horse"},"content":{"rendered":"<p>The <a href=\"http:\/\/ithreats.wordpress.com\/2009\/02\/10\/world-map-infection-report\/\">Threat Researcher blog<\/a> has an interesting graphic today, showing infections by the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/index.php?s=rsplug\">RSPlug Trojan horse<\/a> (that they call MacAccess) around the world. The infections mapped are only those reported to the blog by its readers, which are relatively few, but our information concords with this, that the RSPlug Trojan horse has infected a large number of Macs around the world. The graphic shows that most infections are in the US and Europe, which corresponds to the areas where Macs are most prevalent. Intego receives samples of this Trojan horse from users almost daily, and we can confirm that infections are occurring around the world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world. The infections mapped are only those reported to the blog by its readers, which are relatively few, but our information concords with this, that the RSPlug Trojan horse has infected a large [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mapping the Spread of the RSPlug Trojan Horse - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-02-10T15:44:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/\",\"name\":\"Mapping the Spread of the RSPlug Trojan Horse - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2009-02-10T15:44:04+00:00\",\"dateModified\":\"2009-02-10T15:44:04+00:00\",\"description\":\"The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mapping the Spread of the RSPlug Trojan Horse\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Mapping the Spread of the RSPlug Trojan Horse\",\"datePublished\":\"2009-02-10T15:44:04+00:00\",\"dateModified\":\"2009-02-10T15:44:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#webpage\"},\"wordCount\":113,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/","og_locale":"en_US","og_type":"article","og_title":"Mapping the Spread of the RSPlug Trojan Horse - The Mac Security Blog","og_description":"The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-02-10T15:44:04+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/","name":"Mapping the Spread of the RSPlug Trojan Horse - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2009-02-10T15:44:04+00:00","dateModified":"2009-02-10T15:44:04+00:00","description":"The Threat Researcher blog has an interesting graphic today, showing infections by the RSPlug Trojan horse (that they call MacAccess) around the world.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mapping the Spread of the RSPlug Trojan Horse"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Mapping the Spread of the RSPlug Trojan Horse","datePublished":"2009-02-10T15:44:04+00:00","dateModified":"2009-02-10T15:44:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mapping-the-spread-of-the-rsplug-trojan-horse\/#webpage"},"wordCount":113,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-aK","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/666"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=666"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/666\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}