{"id":68377,"date":"2017-07-26T09:18:30","date_gmt":"2017-07-26T16:18:30","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=68377"},"modified":"2017-07-26T09:18:30","modified_gmt":"2017-07-26T16:18:30","slug":"new-fruitfly-malware-variant-dragged-from-the-shadows","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/","title":{"rendered":"New FruitFly Malware Variant Dragged from the Shadows"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-68449\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware.png\" alt=\"FruitFly Mac Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/osx-fruitfly-malware-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled <a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\" target=\"_blank\" rel=\"noopener\"><strong>OSX\/FruitFly.A<\/strong><\/a> by Intego, this malware slinked back into the shadows not to be seen again\u00a0since it was initially discovered;\u00a0that is, until now. Patrick Wardle, a security researcher and former NSA hacker, has discovered another FruitFly variant, and this one may have been around as long or longer than the original variant\u00a0found in January.<\/p>\n<p>Dubbed <strong>FruitFly.B<\/strong>, this new variant appears to have the\u00a0same functionality as its predecessor. The malware can perform the following actions on an infected Mac:<\/p>\n<ul>\n<li>Take screenshots in various qualities<\/li>\n<li>Record keystrokes<\/li>\n<li>Take pictures with the webcam<\/li>\n<li>Modify files<\/li>\n<li>Collect information about the infected Mac<\/li>\n<\/ul>\n<blockquote><p>&#8220;The most interesting feature is that the malware can send an alert when the user is active, so that the attacker can then avoid interfering with the computer to remain stealthy. I haven&#8217;t seen that before,&#8221; <a href=\"http:\/\/www.zdnet.com\/article\/new-analysis-fruitfly-mac-malwware-almost-undetectable-backdoor\/\" target=\"_blank\">Wardle told ZDNet<\/a>.<\/p><\/blockquote>\n<p>With most of the Command &amp; Control (C&amp;C) servers no longer active, Wardle wrote his own code and registered domains that previously belonged to the (C&amp;C) servers. This allowed him to intercept the malware&#8217;s traffic.<\/p>\n<p>As soon as his C&amp;C servers came online, his screen began\u00a0filling up with data from Macs in the wild that were infected with FruitFly. Instantly sitting on potentially private and sensitive data from the victims out there, he logged the connections, parsed the computer names, and then closed the connection to make sure no further data would be received.<\/p>\n<p>Early analysis shows 90% of the victims who\u00a0connected to his C&amp;C server are in the United States and do not appear to be connected.<\/p>\n<div id=\"attachment_68404\" style=\"width: 1407px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-68404\" loading=\"lazy\" class=\"wp-image-68404 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer.png\" alt=\"fruitflyServer\" width=\"1397\" height=\"695\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer.png 1397w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer-300x149.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer-768x382.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer-1024x509.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitflyServer-657x327.png 657w\" sizes=\"(max-width: 1397px) 100vw, 1397px\" \/><p id=\"caption-attachment-68404\" class=\"wp-caption-text\">A selection of computers, usernames, and computer names infected by FruitFly.B malware. Image credit: Patrick Wardle<\/p><\/div>\n<p>Finding a common connection between infected Macs can help track down where the malware may have originated, but in this case it\u00a0is not possible. FruitFly\u00a0could have been spread via malicious email attachments\u00a0and, as Wardle said, it is most\u00a0likely operated by a single hacker &#8220;with the goal to spy on people for perverse reasons.&#8221;<\/p>\n<p>This new variant is known as <strong>FruitFly.B,<\/strong> and at the time of writing, Apple has not addressed it in its XProtect or Malware Removal Tool signatures. Intego already protects its customers\u00a0from both FruitFly variants.\u00a0<a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\">Intego VirusBarrier<\/a> will identify\u00a0and eradicate the malware as <strong>OSX\/FruitFly.A<\/strong> and <strong>OSX\/FruitFly.B<\/strong>, regardless if the variant\u00a0is an executable, a Perl script, or a Java class.<\/p>\n<p>The first variant was found by a network security team, the second by a security researcher. These researchers\u00a0analyze suspicious behavior of files and network traffic, and in the case of anti-virus companies, write the malware signatures for the software that protects your Mac. Even so, full computer security requires a layered approach to defend against all types of attacks.<\/p>\n<h3>How to secure\u00a0your\u00a0Mac\u00a0with layers of\u00a0protection<\/h3>\n<p>Not everyone has a dedicated network security team and IT admin available, but what if you could have that? Your own network security team sounds expensive, doesn&#8217;t it? A team of people that all need to be paid, the hardware required for them to do their jobs, it adds up quick! So what the next best thing? Software network security, of course!<\/p>\n<p>With a variety of threats targeting you nowadays, the best defense is implementing layers of protection, and that&#8217;s how you should judge potential security software solutions. Anti-virus can stop malicious files, but it&#8217;s not enough to prevent the other worries from filtering through and ruining your stuff.<\/p>\n<p>Below are a few examples of different layers of protection, and each provides a layer of security in their own way. You are not limited to just one or two layers, you can add as many as you like so long as they do not interfere with each other.<\/p>\n<p>Let&#8217;s have a look at the layers of protection included with Intego&#8217;s <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Mac Premium Bundle<\/a>:<\/p>\n<h4><a href=\"https:\/\/www.intego.com\/mac-protection-bundle#netbarrier-x9\"><strong>Intego NetBarrier<\/strong><\/a><\/h4>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61729\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/netbarrier-x9-icon.jpg\" alt=\"Intego NetBarrier X9\" width=\"78\" height=\"78\" \/>Running Intego NetBarrier on your Mac is like having your own personal network security, only a lot more affordable. No team to pay and the hardware it needs is the one you already have. NetBarrier can flag both <a href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-incoming-and-outgoing-firewall-protection\/\" target=\"_blank\" rel=\"noopener\">incoming and outgoing<\/a> connection attempts, so in the case of hidden malware not currently detected by any commercial anti-virus software, you would quickly be made aware of its existence when it attempts to perform a network scan or contact external C&amp;C servers. A sophisticated <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-need-an-outbound-firewall\/\" target=\"_blank\" rel=\"noopener\">two-way firewall<\/a> like NetBarrier adds a very good layer in your security, and it keeps hackers out of your Mac.<\/p>\n<p>What about an IT admin? Surely those don&#8217;t come cheap and good ones are hard to find. Luckily, you can get firewall software like NetBarrier that watches your Mac for any malicious activity, and while not an actual skilled IT admin, it can alert you about malware before an IT admin has to get involved.<\/p>\n<h4><strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle#virusbarrier-x9\">Intego VirusBarrier<\/a><\/strong><\/h4>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61732\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/virusbarrier-x9-icon.jpg\" alt=\"VirusBarrier X9 icon\" width=\"78\" height=\"78\" \/>Watching your Mac around-the-clock for any hints of malware and potentially unwanted programs (PUP&#8217;s), Intego VirusBarrier is a valuable layer of protection. The anti-virus software prevents malicious files from infecting your Mac. Downloads, email attachments, external drives and even the flash drive that someone might be plugging into your Mac with less-than-honorable intentions are all scanned.<\/p>\n<p>VirusBarrier is a sophisticated anti-virus software that prevents malicious files from infecting your Mac, but don&#8217;t rely on it to stop hackers\u2014that&#8217;s a job for NetBarrier\u2014and you should be sure to secure your sensitive data, too.<\/p>\n<h4><a href=\"https:\/\/www.intego.com\/mac-protection-bundle#mac-washing-machine-x9\"><strong>Mac Washing Machine<\/strong><\/a><\/h4>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61735\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/macwashingmachine-x9-icon.jpg\" alt=\"Mac Washing Machine X9 icon\" width=\"78\" height=\"78\" \/>A cluttered hard drive means a more stressed out hard drive. It has to work harder to find the files you request, runs hotter because of it, and ultimately its lifespan may be reduced significantly. All this is amplified as less space becomes available on the drive. Enter Mac Washing Machine, simple to use software that makes it easy to get rid of junk files that slow down your Mac, as well as duplicate files that take up needed space, and even applications you never use. As an added benefit, Mac Washing Machine also helps you stay organized and can automatically organize your heap of Desktop files into the right folders.<\/p>\n<p>Hard drive failure means you can lose your data, and ultimately what Mac Washing Machine does is protect your data by relieving common stressors on your hard drive.<\/p>\n<h4><a href=\"https:\/\/www.intego.com\/mac-protection-bundle#personal-backup-109\"><strong>Personal Backup<\/strong><\/a><\/h4>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61738\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/personalbackup-x9-icon.jpg\" alt=\"Intego Personal Backup X9 icon\" width=\"78\" height=\"78\" \/>Speaking of data security, if you do suffer a hard drive (or solid state drive) failure, a backup will dictate how much of your data is recovered and how recent that data is. Of course, you&#8217;re already using macOS&#8217;s built-in Time Machine feature, but what if both your Mac and backup drive are destroyed in a fire or encrypted by ransomware? Malware, hackers, or system issues can all corrupt or delete your important files, leaving you with nothing. Therefore, you want to backup your data in multiple places (because two backups are better than one), and one of those places, preferably, should be off-site. Personal backup can help you do just that.<\/p>\n<p>If you have multiple hard drives, flash drives, local servers, remote servers or another Mac you want to keep in sync, Personal backup can create a safe copy of your data on it. It&#8217;s incredibly flexible, and it can handle almost any backup schedule you want! Together, with Apple&#8217;s Time Machine, this one-two punch ensures you don&#8217;t lose any important files.<\/p>\n<h4><a href=\"https:\/\/www.intego.com\/mac-protection-bundle#contentbarrier-x9\"><strong>ContentBarrier<\/strong><\/a><\/h4>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61741\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/contentbarrier-x9-icon.jpg\" alt=\"ContentBarrier X9 icon\" width=\"78\" height=\"78\" \/>There is a layer of protection that is often overlooked because not everyone needs it, and it&#8217;s the security of your children. Having an anti-virus, firewall and a solid backup strategy will keep your data safe, but those layers are not properly equipped to keep your child shielded from all the inappropriate content they can be exposed to online. Intego ContentBarrier was designed for just that purpose; with content filtering and parental controls, you don&#8217;t have to worry about what sort of Internet content your children can access.<\/p>\n<p>ContentBarrier&#8217;s configuration is very flexible and enables you to block specific categories of websites, such as Adult, Gambling, and more. Its anti-predator chat monitoring is a very powerful feature as well, which monitors all standard chat protocols and can recognize certain words, phrases or abbreviations that may indicate objectionable or inappropriate things are discussed that could lead to trouble. Instant notifications mean you can ensure your child&#8217;s online safety by instantly blocking online access even when you&#8217;re not home.<\/p>\n<h3>What about macOS built-in security features?<\/h3>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61744\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/macOS-Sierra-Icon.jpg\" alt=\"macOS Sierra icon\" width=\"78\" height=\"78\" \/><a href=\"https:\/\/www.intego.com\/mac-security-blog\/15-mac-hardening-security-tips-to-protect-your-privacy\/\" target=\"_blank\" rel=\"noopener\">Hardening your macOS installation<\/a> itself will add several layers of protection, too. This includes enabling automatic updates, using encryption features like FileVault, setting a screensaver password, disabling Bluetooth when not in use, and keeping plug-ins like Flash Player and Java off your system. By using multiple layers of protection, you&#8217;re keeping your digital life safe, clean, and secure.<\/p>\n<p>These are just a few layers you can enable to keep your data, privacy, personal information and children safe. <em>&#8220;The best security comes in layers&#8221;<\/em> is not just a phrase we throw around in the security community, it&#8217;s true and has been proven effective many times over. With security coverage from multiple angles, it becomes very hard for existing or yet to be discovered malware to infect your Mac.<\/p>\n<p>Layered security can be implemented at any time. During the first setup of your Mac or further down the road, these layers can be implemented quickly and easily. Spending 10 minutes implementing it now can save you hours or days of troubleshooting down the road. Give it a try and let us know which security layers are protecting you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this malware slinked back into the shadows not to be seen again\u00a0since it was initially discovered;\u00a0that is, until now. Patrick Wardle, a security researcher and former NSA hacker, has discovered another FruitFly variant, and this one [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":68455,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[3229,3571,3217],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New FruitFly Malware Variant Dragged from the Shadows - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-26T16:18:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png\",\"width\":400,\"height\":260,\"caption\":\"FruitFly Backdoor Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/\",\"name\":\"New FruitFly Malware Variant Dragged from the Shadows - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#primaryimage\"},\"datePublished\":\"2017-07-26T16:18:30+00:00\",\"dateModified\":\"2017-07-26T16:18:30+00:00\",\"description\":\"Earlier this year in January, security researchers uncovered malware that had\\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New FruitFly Malware Variant Dragged from the Shadows\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"New FruitFly Malware Variant Dragged from the Shadows\",\"datePublished\":\"2017-07-26T16:18:30+00:00\",\"dateModified\":\"2017-07-26T16:18:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#webpage\"},\"wordCount\":1617,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png\",\"keywords\":[\"Fruitfly\",\"FruitFly.B\",\"OSX\/ClientCapture\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/","og_locale":"en_US","og_type":"article","og_title":"New FruitFly Malware Variant Dragged from the Shadows - The Mac Security Blog","og_description":"Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-07-26T16:18:30+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png","width":400,"height":260,"caption":"FruitFly Backdoor Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/","name":"New FruitFly Malware Variant Dragged from the Shadows - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#primaryimage"},"datePublished":"2017-07-26T16:18:30+00:00","dateModified":"2017-07-26T16:18:30+00:00","description":"Earlier this year in January, security researchers uncovered malware that had\u00a0likely evaded detection for years. Labeled OSX\/FruitFly.A by Intego, this","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New FruitFly Malware Variant Dragged from the Shadows"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"New FruitFly Malware Variant Dragged from the Shadows","datePublished":"2017-07-26T16:18:30+00:00","dateModified":"2017-07-26T16:18:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#webpage"},"wordCount":1617,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png","keywords":["Fruitfly","FruitFly.B","OSX\/ClientCapture"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-fruitfly-malware-variant-dragged-from-the-shadows\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/fruitfly-backdoor-malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hMR","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68377"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=68377"}],"version-history":[{"count":28,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68377\/revisions"}],"predecessor-version":[{"id":68428,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68377\/revisions\/68428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/68455"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=68377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=68377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=68377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}