{"id":75766,"date":"2018-02-21T07:43:00","date_gmt":"2018-02-21T15:43:00","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=75766"},"modified":"2022-09-27T12:00:34","modified_gmt":"2022-09-27T19:00:34","slug":"osxshlayer-new-mac-malware-comes-out-of-its-shell","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/","title":{"rendered":"OSX\/Shlayer: New Mac malware comes out of its shell"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"size-medium wp-image-75826 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-300x177.png\" alt=\"\" width=\"300\" height=\"177\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-300x177.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-768x453.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-1024x604.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-657x388.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo.png 1525w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Over the weekend, Intego researchers discovered multiple variants of new Mac malware, <strong>OSX\/Shlayer<\/strong>, that leverages a unique technique.<\/p>\n<p>Although malware that disguises itself as an update to Adobe Flash Player is nothing new, some of the latest incarnations of fake Flash Player\u00a0installers\u00a0have an unusual method of downloading additional content.<\/p>\n<h3>How\u00a0are\u00a0Macs getting infected?<\/h3>\n<p>Intego researchers found OSX\/Shlayer spreading via BitTorrent file sharing sites, appearing as a\u00a0fake Flash Player update when a user attempts to select a link to copy a torrent <a href=\"https:\/\/lifehacker.com\/5875899\/what-are-magnet-links-and-how-do-i-use-them-to-download-torrents\" target=\"_blank\" rel=\"noopener\">magnet link<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-31660\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-278x300.jpeg\" alt=\"\" width=\"139\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-278x300.jpeg 278w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-139x150.jpeg 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350.jpeg 325w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/>Torrent sites are notorious for distributing malware and adware,\u00a0sometimes\u00a0through misleading advertisements, and sometimes through\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" target=\"_blank\" rel=\"noopener\">Trojan horse<\/a>\u00a0downloads that claim to be &#8220;cracks&#8221; or that may contain infected copies of legitimate software\u00a0(watch our recent\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=P5m8wsQ5BFw\" target=\"_blank\" rel=\"noopener\">interview with Amit Serper<\/a>\u00a0or read our article\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" target=\"_blank\" rel=\"noopener\">Why BitTorrent Sites Are a Malware Cesspool<\/a>\u00a0to learn more about the dangers of torrent sites).<\/p>\n<p><strong>Even if you don&#8217;t use torrent sites, you may encounter\u00a0other sites that claim you need to update Flash Player; in most cases,\u00a0this is actually an attempt to install\u00a0malware on your computer.<\/strong><\/p>\n<p>On some of the malware distribution pages, the\u00a0fake Flash Player alerts are customized to your browser. If you&#8217;re using Mozilla Firefox, you may see an upward-facing arrow appear pointing to the browser\u00a0toolbar that indicates that there is a recent download available to open.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-medium wp-image-75808\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_B_download_step_2_Firefox-300x89.png\" alt=\"\" width=\"300\" height=\"89\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_B_download_step_2_Firefox-300x89.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_B_download_step_2_Firefox-150x44.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_B_download_step_2_Firefox-768x228.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_B_download_step_2_Firefox-657x195.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_B_download_step_2_Firefox.png 978w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>If you&#8217;re using Google Chrome, you may see a\u00a0pop-up message pointing to the bottom-left corner of the browser window where newly available downloads appear. Ironically, Google Chrome has its own built-in version of Flash Player that users don&#8217;t need to update manually; it\u00a0gets updated automatically whenever Google issues an update for Chrome itself.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-large wp-image-75805\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-1024x572.jpg\" alt=\"\" width=\"1024\" height=\"572\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-1024x572.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-300x168.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-768x429.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-657x367.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome.jpg 1392w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h3>What&#8217;s unique about OSX\/Shlayer?<\/h3>\n<p>The initial Trojan horse infection (the fake Flash Player installer) component of\u00a0OSX\/Shlayer leverages shell scripts to download additional malware or adware onto the infected system.<\/p>\n<p><img loading=\"lazy\" class=\"alignright wp-image-75817 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/shell-script-icon.png 1024w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>You can think of <strong>shell scripts<\/strong> as a way to execute a\u00a0series\u00a0of commands in sequence, sometimes without requiring any user interaction. They&#8217;re\u00a0sort of like\u00a0a command-line equivalent of an <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/automator\/\" target=\"_blank\" rel=\"noopener\">Automator<\/a> or <a href=\"https:\/\/en.wikipedia.org\/wiki\/AppleScript\" target=\"_blank\" rel=\"noopener\">AppleScript<\/a> app, or the Mac equivalent of a Windows .bat (&#8220;batch&#8221;) file. Instead of malware having to open up the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/terminal\/\" target=\"_blank\" rel=\"noopener\">Terminal<\/a> on your Mac and type commands right before\u00a0your eyes (which would be a pretty obvious sign of infection), malware can secretly execute those commands in the background without the user&#8217;s knowledge by\u00a0leveraging shell scripts.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-75844\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/osx.shlayer-malware.png\" alt=\"OSX\/Shlayer uses double Shell scripts to drop the malicious fake Adobe Flash Player app\" width=\"1005\" height=\"403\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/osx.shlayer-malware.png 1005w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/osx.shlayer-malware-150x60.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/osx.shlayer-malware-300x120.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/osx.shlayer-malware-768x308.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/osx.shlayer-malware-657x263.png 657w\" sizes=\"(max-width: 1005px) 100vw, 1005px\" \/><\/p>\n<p>Malware that downloads additional malicious or undesirable code is known as a <strong>dropper<\/strong>. Intego&#8217;s research team observed OSX\/Shlayer\u00a0behaving as a dropper\u00a0and\u00a0installing\u00a0<strong>OSX\/MacOffers<\/strong>\u00a0(also known as BundleMeUp, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/mughthesec\/\" target=\"_blank\" rel=\"noopener\">Mughthesec<\/a>, and Adload)\u00a0or\u00a0<strong>OSX\/Bundlore<\/strong>\u00a0adware as\u00a0a secondary payload.<\/p>\n<p>There are three variants of the newly discovered malware, detected by Intego VirusBarrier as <strong>OSX\/Shlayer.A<\/strong>, <strong>OSX\/Shlayer.B<\/strong>, and\u00a0<strong>OSX\/Shlayer.C<\/strong>, that differ as follows:<\/p>\n<ul>\n<li>OSX\/Shlayer.A uses two code-signed shell scripts<\/li>\n<li>OSX\/Shlayer.B uses one code-signed shell script and one unsigned <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mach-O\" target=\"_blank\" rel=\"noopener\">Mach-O<\/a> app<\/li>\n<li>OSX\/Shlayer.C\u00a0uses one code-signed\u00a0shell script<\/li>\n<\/ul>\n<p>Code signing is a process used by both legitimate app developers and malware makers. By\u00a0adding a cryptographic digital signature to Mac software,\u00a0a developer can enable their apps\u00a0to more easily bypass Apple&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/gatekeeper\/\" target=\"_blank\" rel=\"noopener\">Gatekeeper<\/a>\u00a0protection (which is closely associated with Apple&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/xprotect\/\" target=\"_blank\" rel=\"noopener\">XProtect<\/a> bad download blocker functionality). Signing an app\u00a0also\u00a0provides a direct link between\u00a0that\u00a0app and a registered member of the Apple Developer Program.<\/p>\n<h3>What does the malware do if installed?<\/h3>\n<p>The primary goal of\u00a0OSX\/Shlayer is to download and install adware onto an infected Mac.<\/p>\n<p>Although &#8220;adware&#8221; may not sound like a big deal, it can be a lot more harmful than the name implies; be sure to watch\u00a0our aforementioned\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=P5m8wsQ5BFw\" target=\"_blank\" rel=\"noopener\">interview with Amit Serper<\/a>\u00a0to learn more about one particular example of malicious Mac adware.<\/p>\n<p>At least one variant of the\u00a0malware also appears to exhibit\u00a0an interesting behavior: It checks whether one of several Mac anti-virus products is installed.<\/p>\n<h3>How can Mac users protect themselves from OSX\/Shlayer?<\/h3>\n<p>To\u00a0prevent infection,\u00a0avoid any &#8220;Flash Player&#8221; update alerts you may encounter on the Web; in most cases, these are actually false warnings intended to trick you into downloading and installing malware.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-75811\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert-1024x681.png\" alt=\"\" width=\"1024\" height=\"681\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert-1024x681.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert-300x199.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert-768x510.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert-657x437.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Download_Your_Flash_Player_fake_alert.png 1944w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\">A fake Flash Player alert on\u00a0a\u00a0site distributing\u00a0OSX\/Shlayer<\/p>\n<p>If you use Google&#8217;s Chrome browser,\u00a0it already has a built-in version of Flash Player, so you&#8217;ll never need to obtain a newer version of the plugin from a third party.<\/p>\n<p>If you use Apple&#8217;s Safari browser, or Mozilla Firefox or other third-party Web browsers,\u00a0you should bookmark\u00a0<a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\" rel=\"noopener\">https:\/\/get.adobe.com\/flashplayer\/<\/a> and only obtain Flash Player updates via that bookmark\u2014that is, if you even need Flash Player in the first place.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-75814\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-300x300.png\" alt=\"Flash Player with universal &quot;No&quot; slash symbol superimposed\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/no-Flash-Player.png 1000w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>In fact, when you get a new computer\u00a0the best practice is to avoid installing Flash Player in the first place. Few legitimate sites require Flash these days, and for the rare site that does, you can view the site in Google Chrome. Adobe is phasing out support for Flash and will <a href=\"https:\/\/theblog.adobe.com\/adobe-flash-update\/\" target=\"_blank\" rel=\"noopener\">cease updating Flash Player<\/a> at the end of 2020.<\/p>\n<p>If you accidentally download a fake Flash Player update and it comes as a .dmg (Mac disk image) file, don&#8217;t double-click it!\u00a0 Simply drag it\u00a0to the Trash, and then from the Finder menu (in the top-left corner of the screen, next to the Apple menu) select &#8220;Empty\u00a0Trash&#8230;&#8221;<\/p>\n<p>See also our article <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\" rel=\"noopener\">How to Tell if Adobe Flash Player Update is Valid<\/a>\u00a0for additional tips.<\/p>\n<p>Users of <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier X9<\/a>\u00a0are\u00a0already protected from all OSX\/Shlayer variants that have been discovered in the wild.<\/p>\n<h3>What can I do if I think my computer is infected?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73081\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/VirusBarrier-Scanner-icon.png 1000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>If you\u00a0suspect that your computer might be infected, you can download <a href=\"https:\/\/www.intego.com\/virusbarrier-scanner\" target=\"_blank\" rel=\"noopener\">VirusBarrier Scanner<\/a>\u00a0(free) from the Mac App Store to scan your computer for an existing infection.<\/p>\n<p>We recommend installing antivirus software with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener\">real-time\u00a0scanning protection<\/a>, such as <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier X9<\/a>\u00a0(part of the\u00a0<a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener\">Mac Premium Bundle X9<\/a>\u00a0utility suite), to help\u00a0block malware before\u00a0an infection can occur.<\/p>\n<h3>Are there any other indicators of compromise (IOCs)?<\/h3>\n<p><span style=\"color: #ff0000;\">WARNING:<\/span>\u00a0Do not attempt to connect to the domain names below; doing so may lead to infection!<\/p>\n<p>Network administrators can check their organizations&#8217; Web traffic logs for attempts to connect to the following domains (or subdomains thereof) on port 80, which may indicate possible infection by either OSX\/Shlayer or\u00a0similar malware or\u00a0adware campaigns that leverage the same domains:<\/p>\n<ul>\n<li>yourreliablesite4content(.)bid \u2014 registered on Feb 20, 2018<\/li>\n<li>macfantsy(.)com\u00a0\u2014 registered in\u00a0Dec 2017<\/li>\n<li>ponystudent(.)win\u00a0\u2014 registered in Aug 2017<\/li>\n<li>childrenlawyer(.)win \u2014 registered in Jul 2017<\/li>\n<li>spoonstory(.)win\u00a0\u2014 registered in\u00a0Jul 2017<\/li>\n<li>macinstallerinfo(.)com\u00a0\u2014 registered in 2015<\/li>\n<li>macresourcescdn(.)com\u00a0\u2014 registered in 2015<\/li>\n<\/ul>\n<h3>Who&#8217;s behind this malware?<\/h3>\n<p>The\u00a0variants of OSX\/Shlayer\u00a0discovered to date have been\u00a0associated with Apple Developer Program accounts registered to\u00a0one of three names: &#8220;Harper Natalie,&#8221; &#8220;Murphy Rachel,&#8221; or &#8220;Gennadiy Karshin.&#8221;<\/p>\n<p>This does not necessarily\u00a0mean that individuals by those names\u00a0are the source of the malware; it&#8217;s possible to register for an Apple Developer Program account using a false identity. (At least the first two names are likely fake,\u00a0given that\u00a0Natalie and Rachel are typically given names, not surnames.)<\/p>\n<p>Moreover, if a\u00a0legitimate Apple Developer Program account\u00a0has been\u00a0compromised, a third party may exploit that account&#8217;s code signing capability for\u00a0malicious purposes.<\/p>\n<p>The domain names associated with this malware are registered using privacy\u00a0screens, so little useful information about the domain registrants is obtainable via publicly searchable records.<\/p>\n<p><em><strong>Have something to say about this story? Share your comments below!<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.<\/p>\n","protected":false},"author":14,"featured_media":52474,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[979,186,3565,2677,57,182,86,495,3619,4096,3928],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/Shlayer: New Mac malware comes out of its shell - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-21T15:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-27T19:00:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\",\"name\":\"OSX\/Shlayer: New Mac malware comes out of its shell - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#primaryimage\"},\"datePublished\":\"2018-02-21T15:43:00+00:00\",\"dateModified\":\"2022-09-27T19:00:34+00:00\",\"description\":\"Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/Shlayer: New Mac malware comes out of its shell\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"OSX\/Shlayer: New Mac malware comes out of its shell\",\"datePublished\":\"2018-02-21T15:43:00+00:00\",\"dateModified\":\"2022-09-27T19:00:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#webpage\"},\"wordCount\":1259,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"keywords\":[\"Adobe Flash\",\"Adobe Flash Player\",\"BitTorrent\",\"Fake Flash Player\",\"Flash\",\"Flash Player\",\"Malware\",\"Malware Analysis\",\"Mughthesec\",\"OSX\/Bundlore\",\"OSX\/Shlayer\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/Shlayer: New Mac malware comes out of its shell - The Mac Security Blog","og_description":"Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-02-21T15:43:00+00:00","article_modified_time":"2022-09-27T19:00:34+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","width":400,"height":260,"caption":"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/","name":"OSX\/Shlayer: New Mac malware comes out of its shell - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#primaryimage"},"datePublished":"2018-02-21T15:43:00+00:00","dateModified":"2022-09-27T19:00:34+00:00","description":"Intego malware researchers discovered a new kind of fake Flash Player updater, which uses Shell scripts to decode dropper(s) and infect Macs with malware, identified as OSX\/Shlayer.A, OSX\/Shlayer.B, and OSX\/Shlayer.C.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/Shlayer: New Mac malware comes out of its shell"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"OSX\/Shlayer: New Mac malware comes out of its shell","datePublished":"2018-02-21T15:43:00+00:00","dateModified":"2022-09-27T19:00:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#webpage"},"wordCount":1259,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","keywords":["Adobe Flash","Adobe Flash Player","BitTorrent","Fake Flash Player","Flash","Flash Player","Malware","Malware Analysis","Mughthesec","OSX\/Bundlore","OSX\/Shlayer"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jI2","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/75766"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=75766"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/75766\/revisions"}],"predecessor-version":[{"id":88237,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/75766\/revisions\/88237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52474"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=75766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=75766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=75766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}