	{"id":738,"date":"2009-03-17T15:39:48","date_gmt":"2009-03-17T22:39:48","guid":{"rendered":"http:\/\/blog.intego.com\/?p=738"},"modified":"2016-02-12T09:56:38","modified_gmt":"2016-02-12T17:56:38","slug":"new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/","title":{"rendered":"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations"},"content":{"rendered":"<p>It seems like it was just yesterday that we <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-rsplug-trojan-hackers-taunt-intego-again\/\">wrote about a new variant of the RSPlug Trojan horse<\/a>. And already there&#8217;s another: RSPlug.G, which, unlike the last one, no longer calls out Intego, but rather one of our competitors.<\/p>\n<p>What&#8217;s different, though, with the latest version is the scope of attack. No longer is this Trojan horse limited to porn sites, but is now &#8220;available&#8221; from dozens of websites that claim to offer cracks and serial numbers for popular software.<\/p>\n<p>Intego has spotted a slew of websites, most of them which are linked to each other, which claim to offer downloads of keygens (used on Windows to create serial numbers), cracks (to allow applications to be used), and serial numbers. The names of the disk images that Mac users download &#8211; some of these links also offer similar Trojan horses for Windows users &#8211; are things such as serial.Avid.Xpress.Pro.5.8.dmg.<\/p>\n<p><center><br \/>\n<img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg\" alt=\"\" \/><\/center><br \/>\nWhen these disk images are mounted and opened, one finds an install.pkg, a package file, which, when double-clicked, opens Apple&#8217;s Installer application. Installer shows that it is going to install MacCinema &#8211; which clearly has nothing to do with cracks or serial numbers.<\/p>\n<p><center><br \/>\n<img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/maccinema.jpg\" alt=\"\" \/><\/center><br \/>\nAs always, we advise Mac users to stay away from pirated software and from websites that claim to provide it. <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">Intego VirusBarrier X5<\/a> spotted this variant right away using its behavioral analysis, and Intego has updated the program&#8217;s virus definitions as well. So stay safe; don&#8217;t look for pirated software and your chances of getting infected are much lower.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there&#8217;s another: RSPlug.G, which, unlike the last one, no longer calls out Intego, but rather one of our competitors. What&#8217;s different, though, with the latest version is the scope of attack. No longer is [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,2683,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there&#039;s another: RSPlug.G, which, unlike the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there&#039;s another: RSPlug.G, which, unlike the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-03-17T22:39:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T17:56:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/\",\"name\":\"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#primaryimage\"},\"datePublished\":\"2009-03-17T22:39:48+00:00\",\"dateModified\":\"2016-02-12T17:56:38+00:00\",\"description\":\"It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there's another: RSPlug.G, which, unlike the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations\",\"datePublished\":\"2009-03-17T22:39:48+00:00\",\"dateModified\":\"2016-02-12T17:56:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#webpage\"},\"wordCount\":269,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg\",\"keywords\":[\"Malware\",\"RSPlug\",\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there's another: RSPlug.G, which, unlike the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/","og_locale":"en_US","og_type":"article","og_title":"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations - The Mac Security Blog","og_description":"It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there's another: RSPlug.G, which, unlike the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-03-17T22:39:48+00:00","article_modified_time":"2016-02-12T17:56:38+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/","name":"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#primaryimage"},"datePublished":"2009-03-17T22:39:48+00:00","dateModified":"2016-02-12T17:56:38+00:00","description":"It seems like it was just yesterday that we wrote about a new variant of the RSPlug Trojan horse. And already there's another: RSPlug.G, which, unlike the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"New RSPlug Trojan Horse Variant: New Code, New Theater of Operations","datePublished":"2009-03-17T22:39:48+00:00","dateModified":"2016-02-12T17:56:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#webpage"},"wordCount":269,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/rsplugg.jpg","keywords":["Malware","RSPlug","Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-rsplug-trojan-horse-variant-new-code-new-theater-of-operations\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-bU","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/738"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=738"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/738\/revisions"}],"predecessor-version":[{"id":7302,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/738\/revisions\/7302"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}