{"id":68623,"date":"2017-07-28T09:20:17","date_gmt":"2017-07-28T16:20:17","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=68623"},"modified":"2017-07-28T09:24:42","modified_gmt":"2017-07-28T16:24:42","slug":"apple-updates-xprotect-to-block-new-leverage-malware-variant","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/","title":{"rendered":"Apple Updates XProtect to Block New Leverage Malware Variant"},"content":{"rendered":"<p>Following the discovery of a new version of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-trojan-discovered-related-to-syria\/\" target=\"_blank\">OSX\/Leverage<\/a>, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions to version 2093. This update provides basic detection for this new threat, which the Apple security team named\u00a0OSX.Leverage.A. Intego VirusBarrier already provides protection against this threat, which it identifies as OSX\/FlashyComposer.A.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-68668\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/OSX.Leverage.A-1.png\" alt=\"OSX.Leverage.A\" width=\"510\" height=\"127\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/OSX.Leverage.A-1.png 510w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/OSX.Leverage.A-1-150x37.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/OSX.Leverage.A-1-300x75.png 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/><\/p>\n<p>The malware\u00a0is a newer version of OSX\/Leverage.A, which <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-trojan-discovered-related-to-syria\/\" target=\"_blank\">Intego analyzed<\/a> back in 2013. While the core sources of the two Leverage samples are the same, there are some notable differences in the new threat.<\/p>\n<p>The first Leverage variant was a Trojan application that masqueraded as a picture (the .app file extension was not visible by default), and once installed, our testing revealed that the Trojan would attempt to download a logo of the Syrian Electronic Army hacker group onto the infected machine.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-17919\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/syrian-electronic-army.jpeg\" alt=\"Leverage Mac Trojan\" width=\"460\" height=\"276\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/syrian-electronic-army.jpeg 460w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/syrian-electronic-army-150x90.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/syrian-electronic-army-300x180.jpeg 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/p>\n<p>The new iteration disguises itself as a fake Flash Player update, which Intego warned could happen in our 2013 blog post.\u00a0Additionally, the new version of the Leverage malware is signed with an Apple code signing certificate issued to a developer, named &#8220;Aleks Papandopulo,&#8221; as noted by <a href=\"http:\/\/www.securityweek.com\/georgian-news-site-serves-new-version-old-mac-trojan\" target=\"_blank\">Security Week&#8217;s\u00a0Eduard Kovacs<\/a>.<\/p>\n<p>A potential victim will land on a webpage designed to appear as though it is a legitimate Adobe website, which loads an iframe from a URL with malicious code. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\"><strong>(RELATED: How to Tell if Adobe Flash Player Update is Valid)<\/strong><\/a><\/p>\n<div id=\"attachment_68656\" style=\"width: 751px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-68656\" loading=\"lazy\" class=\"size-full wp-image-68656\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec.png\" alt=\"GetFlashPlayer\" width=\"741\" height=\"562\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec.png 741w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec-150x114.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec-300x228.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/Leverage-GetFlashPlayer-autoexec-657x498.png 657w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><p id=\"caption-attachment-68656\" class=\"wp-caption-text\">The malicious code attempts to download and install a fake Flash update. Image credit: <a href=\"https:\/\/www.volexity.com\/blog\/2017\/07\/24\/real-news-fake-flash-mac-os-x-users-targeted\/\" target=\"_blank\">Volexity<\/a>.<\/p><\/div>\n<p>If a victim allows the execution of the malicious file when prompted or manually executes it from the Downloads folder, the Leverage malware\u00a0installs a backdoor that beacons back to its command and control (C&amp;C) server once per second until a connection is established, and sends information about the infected Mac.\u00a0Veloxity researchers eloquently <a href=\"https:\/\/www.volexity.com\/blog\/2017\/07\/24\/real-news-fake-flash-mac-os-x-users-targeted\/\" target=\"_blank\">clarified<\/a>, &#8220;Unlike the earlier version of the malware, this new version does not limit itself to a predefined set of commands and instead allows an unrestricted command shell capability back into an infected system.&#8221;<\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\">Intego VirusBarrier<\/a> with up-to-date virus\u00a0definitions will detect\u00a0and eradicate the Leverage malware, the original\u00a0variant\u00a0identified as <strong>OSX\/Leverage.A<\/strong>, and due to the way the new Mac Trojan disguises itself as a fake Flash Player update, the new variant will be flagged by our anti-virus software as <strong>OSX\/FlashyComposer.A<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions to version 2093. This update provides basic detection for this new threat, which the Apple security team named\u00a0OSX.Leverage.A. Intego VirusBarrier already provides protection against this threat, which it identifies as [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":31663,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[86,3583,635,303],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Updates XProtect to Block New Leverage Malware Variant - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-28T16:20:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-28T16:24:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Mac Trojan\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/\",\"name\":\"Apple Updates XProtect to Block New Leverage Malware Variant - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#primaryimage\"},\"datePublished\":\"2017-07-28T16:20:17+00:00\",\"dateModified\":\"2017-07-28T16:24:42+00:00\",\"description\":\"Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Updates XProtect to Block New Leverage Malware Variant\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple Updates XProtect to Block New Leverage Malware Variant\",\"datePublished\":\"2017-07-28T16:20:17+00:00\",\"dateModified\":\"2017-07-28T16:24:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#webpage\"},\"wordCount\":407,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg\",\"keywords\":[\"Malware\",\"OSX\/FlashyComposer.A\",\"OSX\/Leverage.A\",\"XProtect\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/","og_locale":"en_US","og_type":"article","og_title":"Apple Updates XProtect to Block New Leverage Malware Variant - The Mac Security Blog","og_description":"Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-07-28T16:20:17+00:00","article_modified_time":"2017-07-28T16:24:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg","width":400,"height":260,"caption":"Mac Trojan"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/","name":"Apple Updates XProtect to Block New Leverage Malware Variant - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#primaryimage"},"datePublished":"2017-07-28T16:20:17+00:00","dateModified":"2017-07-28T16:24:42+00:00","description":"Following the discovery of a new version of OSX\/Leverage, a backdoor first spotted in 2013, Apple has issued an update to its XProtect malware definitions","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Updates XProtect to Block New Leverage Malware Variant"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple Updates XProtect to Block New Leverage Malware Variant","datePublished":"2017-07-28T16:20:17+00:00","dateModified":"2017-07-28T16:24:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#webpage"},"wordCount":407,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg","keywords":["Malware","OSX\/FlashyComposer.A","OSX\/Leverage.A","XProtect"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-to-block-new-leverage-malware-variant\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hQP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68623"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=68623"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68623\/revisions"}],"predecessor-version":[{"id":68674,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/68623\/revisions\/68674"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/31663"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=68623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=68623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=68623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}