{"id":72562,"date":"2017-11-21T12:04:11","date_gmt":"2017-11-21T20:04:11","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=72562"},"modified":"2017-11-21T12:04:11","modified_gmt":"2017-11-21T20:04:11","slug":"watch-out-a-fake-antivirus-blog-is-distributing-proton-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/","title":{"rendered":"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-72664\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Symantec-Antivirus-Proton.D-Malware.png\" alt=\"Fake Symantec Antivirus Proton.D Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Symantec-Antivirus-Proton.D-Malware.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Symantec-Antivirus-Proton.D-Malware-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Symantec-Antivirus-Proton.D-Malware-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher &#8220;noar&#8221; (<a href=\"https:\/\/twitter.com\/noarfromspace\" target=\"_blank\" rel=\"noopener\">@noarfromspace<\/a>). The previous iteration of Proton malware, discovered <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxproton-malware-is-back-heres-what-mac-users-need-to-know\/\" target=\"_blank\">in\u00a0October<\/a>, had targeted Eltima, the makers of the Elmedia Player software.\u00a0This time, OSX\/Proton is being distributed as part of a fake antivirus\u00a0scanner, named &#8220;Symantec Malware Detector,&#8221; found on a Symantec\u00a0security blog that is equally fake.<\/p>\n<p>The blog symantecblog(.)com is a professional looking\u00a0clone of the real Symantec blog, and even has a post on it about a &#8220;new version&#8221; of CoinThief, a trojan from a few years ago.\u00a0The trick post concludes with the following\u00a0recommendation:<\/p>\n<blockquote><p>&#8220;To scan the system for all traces of the malware and completely remove CoinThief from the preinstalled software you can use our free tool &#8211; Symantec Malware Detector.&#8221;<\/p><\/blockquote>\n<p>The\u00a0truth is there\u00a0is no new version of &#8220;CoinThief&#8221; malware, and the recommended Symantec Malware Detector is nothing but a way to con Mac users into installing a new variant of OSX\/Proton. <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> identifies and eradicates this new variant of Proton\u00a0malware as <strong>OSX\/Proton.D<\/strong>.<\/p>\n<h3>How does Proton malware install?<\/h3>\n<p>Those who\u00a0download and run the fake antivirus\u00a0are greeted with a window that sports the Symantec brand along with\u00a0a small agreement notice.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72568 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/1-SymantecMalwareDetectorStart.png\" alt=\"fake antivirus - symantec malware detector\" width=\"539\" height=\"251\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/1-SymantecMalwareDetectorStart.png 539w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/1-SymantecMalwareDetectorStart-150x70.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/1-SymantecMalwareDetectorStart-300x140.png 300w\" sizes=\"(max-width: 539px) 100vw, 539px\" \/><\/p>\n<p>Clicking the &#8220;Check&#8221; button will prompt for administrative login credentials. This prompt also looks genuine.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72574 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest.png\" alt=\"Symantec Malware Detector phishing for credentials\" width=\"444\" height=\"236\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest.png 444w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/2-AdminCredentialsRequest-300x159.png 300w\" sizes=\"(max-width: 444px) 100vw, 444px\" \/><\/p>\n<p>Once the password is entered, OSX\/Proton.D has everything it needs to install. Users will be presented with a scan in progress, which is, of course, also fake \u2014 Proton malware will install in the background.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72580 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/3-FakeScan.png\" alt=\"Fake Antivirus \" width=\"541\" height=\"253\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/3-FakeScan.png 541w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/3-FakeScan-150x70.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/3-FakeScan-300x140.png 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/p>\n<p>When the fake scan completes, the all-clear is given and the application can be quit.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72586 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/4-AllClear.png\" alt=\"Symantec Malware Detector\" width=\"539\" height=\"251\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/4-AllClear.png 539w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/4-AllClear-150x70.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/4-AllClear-300x140.png 300w\" sizes=\"(max-width: 539px) 100vw, 539px\" \/><\/p>\n<p>If a good firewall is used, you can see the malware even attempts to connect to symantecheurengine(.)com, which at first glance does not appear suspicious as the application specifically mentioned a heuristic engine during setup. However, a closer look at that domain shows this is also a fake. Typing it in to a browser window will simply redirect to the fake\u00a0Symantec website as it only accepts traffic on a specific port, but a lookup of the domain quickly reveals this is not a Symantec domain.<\/p>\n<p>The registration details mention an @protonmail.com address and the hosting is not one Symantec uses. The registration date is also just a few days old.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72604 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/7-Registrationinfo1.png\" alt=\"Fake Symantec blog registrant contact\" width=\"818\" height=\"428\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/7-Registrationinfo1.png 818w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/7-Registrationinfo1-150x78.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/7-Registrationinfo1-300x157.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/7-Registrationinfo1-768x402.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/7-Registrationinfo1-657x344.png 657w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-72610 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/8-Registrationinfo2.png\" alt=\"\" width=\"580\" height=\"139\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/8-Registrationinfo2.png 580w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/8-Registrationinfo2-150x36.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/8-Registrationinfo2-300x72.png 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/p>\n<p>This domain is most likely the Command &amp; Control (C&amp;C) server as it is pinged by the malware often.<\/p>\n<p>The use of a protonmail email address is also observed when checking the registration of the symantecblog(.)com domain.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72616 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/9-Registrationinfo3.png\" alt=\"Fake Symantec blog email contact\" width=\"791\" height=\"316\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/9-Registrationinfo3.png 791w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/9-Registrationinfo3-150x60.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/9-Registrationinfo3-300x120.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/9-Registrationinfo3-768x307.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/9-Registrationinfo3-657x262.png 657w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-72622 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/10-Registrationinfo4.png\" alt=\"\" width=\"647\" height=\"118\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/10-Registrationinfo4.png 647w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/10-Registrationinfo4-150x27.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/10-Registrationinfo4-300x55.png 300w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/p>\n<h3>What can OSX\/Proton.D do on infected Macs?<\/h3>\n<p>If a Mac user followed all of the above steps installing the malware,\u00a0OSX\/Proton.D will have\u00a0already collected several pieces of information and stored them in a hidden directory, waiting to be uploaded. Information gathered by OSX\/Proton includes:<\/p>\n<ul>\n<li>A screenshot of the desktop<\/li>\n<li>Your user name and password<\/li>\n<li>IP address<\/li>\n<li>Version of macOS<\/li>\n<li>Hardware serial number<\/li>\n<li>List of the last run terminal commands<\/li>\n<li>Contents of your system and local Keychains<\/li>\n<li>List of installed applications<\/li>\n<li>Browser history and stored cookies<\/li>\n<li>1Password vaults<\/li>\n<li>GPG passwords<\/li>\n<\/ul>\n<p>And this is just what&#8217;s collected upon installation. With the administrator name and password available, the contents of the Mac Keychain can be accessed right away, which gives those behind this latest OSX\/Proton access to social media accounts, online banking and much more sites and services that have their info stored in the keychain.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72592 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/5-PartofDataCollected.png\" alt=\"OSX\/Proton.D malware\" width=\"549\" height=\"441\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/5-PartofDataCollected.png 549w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/5-PartofDataCollected-150x120.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/5-PartofDataCollected-300x241.png 300w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/><\/p>\n<h3>Should Mac users be concerned about Proton?<\/h3>\n<p>It&#8217;s clear by now that OSX\/Proton is a successful backdoor, so we expect it will be used more in the future. What makes it successful is the way it&#8217;s distributed, not the malware itself (which is still pretty rudimentary in how it keeps itself active). By going after supply chains, like it did with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-spreads-through-modified-transmission-application-again\/\" target=\"_blank\" rel=\"noopener\">Transmission<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxproton-malware-is-back-heres-what-mac-users-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Eltima<\/a>, and now through faking a legitimate security blog, malicious actors have found ways to get the malware onto more systems. Even those who\u00a0never download software from bad sources, never click suspicious pop-ups, and never click links in emails that look suspect can become infected.<\/p>\n<h3>How to tell if your Mac is infected (and removal instructions)<\/h3>\n<p>Open Activity Monitor and search for a process named &#8220;xpcd.&#8221; If this process is running, your Mac is infected.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72598 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/6-xpcdActivityMonitor.png\" alt=\"xpcd is a malicious process\" width=\"707\" height=\"99\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/6-xpcdActivityMonitor.png 707w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/6-xpcdActivityMonitor-150x21.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/6-xpcdActivityMonitor-300x42.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/6-xpcdActivityMonitor-657x92.png 657w\" sizes=\"(max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>Click the process, and then close it with the <strong>X<\/strong> button in the menu bar.<\/p>\n<p>To clear the infection off your Mac, browse to the following folders and trash the following files:<\/p>\n<ul>\n<li><strong>Applications*<\/strong> &#8211; Delete the Symantec Malware Detector application.<br \/>\n*It may also be in your Downloads folder or on your Desktop.<\/li>\n<li><strong>Library<\/strong> &gt; <strong>LaunchAgents<\/strong> &gt; <strong>com.apple.xpcd.plist<\/strong> &#8211; Delete this file.<\/li>\n<\/ul>\n<p>To manually check for the invisible files OSX\/Proton placed, first you need to make invisible files visible in the Finder. In macOS Sierra and High Sierra, this can quickly be done with the following key combination:<\/p>\n<blockquote><p>Command-Shift-. (period)<\/p><\/blockquote>\n<p>For older OS X versions, this can be done by typing the following commands in the Terminal app:<\/p>\n<blockquote>\n<pre>$ defaults write com.apple.Finder AppleShowAllFiles true\r\n $ killall Finder<\/pre>\n<\/blockquote>\n<p>When done, enter the same commands but change &#8220;true&#8221; to &#8220;false.&#8221;<\/p>\n<p>With the hidden files now visible, check both the root library and the user library for these files:<\/p>\n<ul>\n<li><strong>Library<\/strong> &gt; <strong>.cachedir<\/strong> &#8211; Delete this directory (this holds the collected data)<\/li>\n<li><strong>Library<\/strong> &gt; <strong>.random<\/strong> &#8211; Delete this directory (this holds the OSX\/Proton backdoor)<\/li>\n<\/ul>\n<p>With those files deleted, empty the trash and restart your Mac. Double-check the same locations again after the restart to ensure the infection is indeed cleared. If a warning shows that some items cannot be deleted, because they are in use, you&#8217;ll be able to empty the trash after the restart.<\/p>\n<p>For Intego&#8217;s Mac anti-virus customers, protection comes in the form of updated malware definitions, which will detect and remove all of the Proton files. Proton components are detected by <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> as <strong>OSX\/Proton.D<\/strong>.<\/p>\n<h3>How to protect yourself from Proton<\/h3>\n<p>Running Mac\u00a0antivirus with up to date malware definitions is\u00a0always recommended. In this way,\u00a0malware can be caught before it even has a chance to install. The use of a good firewall is also highly recommended, because\u00a0newly discovered malware must be added to the product definitions before it&#8217;s able to find and eliminate the malware. While this is typically done within hours of a new malware discovery, there is always a small gap. A firewall does not require definition updates; after all, network traffic is network traffic.<\/p>\n<p>Even if no antivirus product is used, a firewall will show you when an application or process attempts to phone home. This gives you time to research the information displayed and make an informed decision to allow or deny the connection. For example, here is what <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security#netbarrier-x9\">Intego NetBarrier<\/a>\u00a0users will see upon catching OSX\/Proton&#8217;s attempt to contact the fake domain:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-72628 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/11-NetBarrierAlert.png\" alt=\"Intego NetBarrier detecting Proton malware\" width=\"558\" height=\"299\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/11-NetBarrierAlert.png 558w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/11-NetBarrierAlert-150x80.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/11-NetBarrierAlert-300x161.png 300w\" sizes=\"(max-width: 558px) 100vw, 558px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher &#8220;noar&#8221; (@noarfromspace). The previous iteration of Proton malware, discovered in\u00a0October, had targeted Eltima, the makers of the Elmedia Player software.\u00a0This time, OSX\/Proton is being distributed as part of a fake antivirus\u00a0scanner, named &#8220;Symantec Malware Detector,&#8221; found on a Symantec\u00a0security blog that is equally fake. The [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":72679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[54,3784,3469,3787,3790],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher &quot;noar&quot; (@noarfromspace). The previous iteration of Proton malware,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher &quot;noar&quot; (@noarfromspace). The previous iteration of Proton malware,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-21T20:04:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png\",\"width\":400,\"height\":260,\"caption\":\"Fake Antivirus - Symantec Malware Detector\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\",\"name\":\"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#primaryimage\"},\"datePublished\":\"2017-11-21T20:04:11+00:00\",\"dateModified\":\"2017-11-21T20:04:11+00:00\",\"description\":\"A\\u00a0new variant of OSX\/Proton\\u00a0has been uncovered this week by malware\\u00a0researcher \\\"noar\\\" (@noarfromspace). The previous iteration of Proton malware,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware\",\"datePublished\":\"2017-11-21T20:04:11+00:00\",\"dateModified\":\"2017-11-21T20:04:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#webpage\"},\"wordCount\":1148,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png\",\"keywords\":[\"Fake Antivirus\",\"OSX\/Proton.D\",\"Proton\",\"Symantec Malware Detector\",\"xpcd\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher \"noar\" (@noarfromspace). The previous iteration of Proton malware,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/","og_locale":"en_US","og_type":"article","og_title":"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware - The Mac Security Blog","og_description":"A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher \"noar\" (@noarfromspace). The previous iteration of Proton malware,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-11-21T20:04:11+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png","width":400,"height":260,"caption":"Fake Antivirus - Symantec Malware Detector"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/","name":"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#primaryimage"},"datePublished":"2017-11-21T20:04:11+00:00","dateModified":"2017-11-21T20:04:11+00:00","description":"A\u00a0new variant of OSX\/Proton\u00a0has been uncovered this week by malware\u00a0researcher \"noar\" (@noarfromspace). The previous iteration of Proton malware,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Watch Out! A Fake Antivirus Blog is Distributing Proton Malware","datePublished":"2017-11-21T20:04:11+00:00","dateModified":"2017-11-21T20:04:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#webpage"},"wordCount":1148,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png","keywords":["Fake Antivirus","OSX\/Proton.D","Proton","Symantec Malware Detector","xpcd"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/11\/Fake-Antivirus-Symantec-Proton-Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-iSm","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/72562"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=72562"}],"version-history":[{"count":29,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/72562\/revisions"}],"predecessor-version":[{"id":72634,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/72562\/revisions\/72634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/72679"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=72562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=72562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=72562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}