{"id":76789,"date":"2018-03-21T08:27:14","date_gmt":"2018-03-21T15:27:14","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=76789"},"modified":"2024-04-18T03:19:56","modified_gmt":"2024-04-18T10:19:56","slug":"unwanted-cryptomining-debuts-briefly-in-mac-app-store","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/","title":{"rendered":"Unwanted cryptomining debuts (briefly) in Mac App Store"},"content":{"rendered":"<p>How much should you trust App Store apps? And how well does Apple screen apps to ensure they don&#8217;t contain any unwelcome behavior?<\/p>\n<p>If you think of the App Store as a safe haven, you might be <em>unpleasantly<\/em> surprised about some recent events.<\/p>\n<h3>Calendar 2 App Oversteps Its Bounds<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-76801\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-300x300.png\" alt=\"\" width=\"180\" height=\"180\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-icon.png 1024w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/>Several users of Qbix, Inc.&#8217;s app <strong>Calendar 2<\/strong>, available in the Mac App Store, recently began having some unexpected and undesirable experiences after updating the app. According to App Store reviews, users may have experienced the following strange behaviors:<\/p>\n<ul>\n<li>their Mac seemed to run more slowly<\/li>\n<li>their Mac&#8217;s fans would spin loudly for hours<\/li>\n<li>their Mac was noticeably hotter than usual<\/li>\n<li>their MacBook&#8217;s battery drained much faster than normal<\/li>\n<li>their Mac&#8217;s CPU (central processing unit) would constantly stay at its maximum utilization<\/li>\n<li>they would repeatedly see dialog boxes telling them that a process called xmr-stak had unexpectedly quit<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76795\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Mac-App-Store-reviews.png\" alt=\"\" width=\"988\" height=\"763\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Mac-App-Store-reviews.png 988w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Mac-App-Store-reviews-150x116.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Mac-App-Store-reviews-300x232.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Mac-App-Store-reviews-768x593.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Mac-App-Store-reviews-657x507.png 657w\" sizes=\"(max-width: 988px) 100vw, 988px\" \/>Calendar 2&#8217;s reviews have not been positive. Image: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x2B.html\" target=\"_blank\" rel=\"noopener\">Patrick Wardle<\/a><\/p>\n<p>What could have caused all of these problems? It turns out that Calendar 2 versions 2.6.0 and 2.6.1 included a new &#8220;feature&#8221; that gave users an option to enable all of the app&#8217;s advanced features without having to pay the usual $17.99 for them.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73084\" title=\"Monero logo\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-150x150.png\" alt=\"Monero logo\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-1024x1024.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-128x128.png 128w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>That &#8220;feature&#8221; was that the calendar app would use their Mac&#8217;s processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.<\/p>\n<p>(To learn more about\u00a0cryptocurrency mining,\u00a0listen to\u00a0<a href=\"http:\/\/podcast.intego.com\/5\" target=\"_blank\" rel=\"noopener\">episode 5<\/a> of the <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a>.)<\/p>\n<p>The app&#8217;s description in the App Store said nothing about cryptocurrency. And according to some App Store reviews, the mining mode was allegedly enabled by default, meaning that users were taken by surprise and did not opt into allowing their Mac to exhibit the\u00a0undesirable behaviors.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76798\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen.png\" alt=\"\" width=\"573\" height=\"581\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen.png 573w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen-148x150.png 148w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen-296x300.png 296w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Calendar-2-Enable-all-features-screen-96x96.png 96w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/>\u00a0Calendar 2 was not very clear about what it was doing. Image: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x2B.html\" target=\"_blank\" rel=\"noopener\">Wardle<\/a><\/p>\n<p>Even if users had explicitly chosen to enable cryptocurrency mining, the app itself wasn&#8217;t particularly clear about what behavior users could expect. The option within the app claimed that &#8220;Calendar app unobtrusively generates crypto-currency in the background,&#8221; without further explanation about what that means or how it could potentially impact their user experience.<\/p>\n<p>In any case, the app&#8217;s behavior was evidently not &#8220;unobtrusive,&#8221; and users were very displeased.<\/p>\n<p>After a few popular news sites had written about what was happening, and in the midst of much discussion in public forums such as Twitter, Apple evidently removed the offending app from the Mac App Store on March 12.\u00a0On March 13, Qbix released an updated version of Calendar 2 that appears to have removed the mining capabilities.<\/p>\n<p>If you have an affected version of Calendar 2 installed on your Mac, <a href=\"https:\/\/www.intego.com\/products\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier<\/a> will warn you by flagging the software as <strong>OSX\/Miner<\/strong>. Although not necessarily malicious, affected versions of Calendar 2 could best be described as &#8220;potentially unwanted apps&#8221; (PUAs, also known as a &#8220;potentially unwanted programs&#8221; or PUPs); they exhibit undesirable and potentially harmful behavior inconsistent with users&#8217; wishes.<\/p>\n<p>If you&#8217;d like to\u00a0read\u00a0a highly technical analysis of an affected version of the Calendar 2 app,\u00a0see\u00a0<a href=\"https:\/\/objective-see.com\/blog\/blog_0x2B.html\" target=\"_blank\" rel=\"noopener\">Patrick Wardle&#8217;s write-up<\/a>.<\/p>\n<p><strong>For further discussion of this news story<\/strong>, be sure to listen to\u00a0<a href=\"http:\/\/podcast.intego.com\/23\" target=\"_blank\" rel=\"noopener\">episode 23<\/a> of the <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a>, in which Kirk McElhearn and I discuss this and other topics.<\/p>\n<h3>Did Calendar 2 Violate App Store Policies?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76123\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-768x771.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-657x659.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra.png 916w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>There was some debate about whether or not Calendar 2 technically violated Apple&#8217;s <a href=\"https:\/\/developer.apple.com\/app-store\/review\/guidelines\/\" target=\"_blank\" rel=\"noopener\">App Store Review Guidelines<\/a>. As of when this article is being published, Apple <em>does not<\/em> explicitly forbid App Store apps from mining cryptocurrency.<\/p>\n<p>However, there are a number of grounds on which Apple could potentially ban apps that exhibit similar behaviors, including:<\/p>\n<p><em>From section 3.2.2, on &#8220;Unacceptable&#8221; business models:<\/em><\/p>\n<blockquote><p>&#8220;Monetizing built-in capabilities provided by the hardware or operating system, such as Push Notifications, the camera, or the gyroscope\u2026&#8221;<\/p><\/blockquote>\n<p>Leveraging CPU or GPU (graphics processing unit) processing power to make money for the developer could be interpreted as a violation of this policy.<\/p>\n<p><em>From\u00a0section 3.1.4:<\/em><\/p>\n<blockquote><p>&#8220;Apps may not use their own mechanisms to unlock content or functionality, such as license keys, augmented reality markers, QR codes, etc.&#8221;<\/p><\/blockquote>\n<p>Calendar 2&#8217;s option to get &#8220;all advanced features for free&#8221; by enabling cryptocurrency mining could be viewed as a violation of this policy.<\/p>\n<p><em>From\u00a0section 2.5.3:<\/em><\/p>\n<blockquote><p>&#8220;Apps that transmit viruses, files, computer code, or programs that may harm or disrupt the normal operation of the operating system and\/or hardware features\u2026 will be rejected.&#8221;<\/p><\/blockquote>\n<p>In this case, the cryptocurrency mining clearly disrupted\u00a0Macs&#8217; normal operation.<\/p>\n<p><em>From section 2.1:<\/em><\/p>\n<blockquote><p>&#8220;We will reject incomplete app bundles and binaries that crash or exhibit obvious technical problems.&#8221;<\/p><\/blockquote>\n<p>At least one\u00a0review\u00a0that many\u00a0people rated as helpful said that the mining process that ran in the background\u00a0(xmr-stak) was repeatedly crashing.\u00a0To the average user, maximum CPU utilization slowing down their whole computer is a technical problem!<\/p>\n<p><em>From section\u00a01.4.5:<\/em><\/p>\n<blockquote><p>&#8220;Apps should not urge customers to use their devices in a way that contradicts safety documentation for Apple hardware, risking damage to the device or physical harm to people.&#8221;<\/p><\/blockquote>\n<p>Although running cryptocurrency mining software may not be mentioned in Apple&#8217;s safety documentation, the behavior exhibited by Calendar 2 could risk damage to a Mac (e.g. caused by overheating for an extended period of time) and could potentially cause physical harm to people (e.g. skin burns caused by an overly hot laptop).<\/p>\n<p><em>Regardless of whether cryptocurrency mining is technically in violation of the App Store Review Guidelines or not, it&#8217;s certainly in Apple&#8217;s best interest to prevent apps from behaving as Calendar 2 did.<\/em><\/p>\n<p>Can you imagine if it were a regular occurrence for App Store developers to include mining features in their apps? What if you had more than one cryptocurrency miner running on your system at the same time, fighting for control of your Mac&#8217;s processing power?<\/p>\n<p>If Apple were to permit App Store apps to behave this way, Macs would develop a reputation of being slow, unstable, and unusable\u2014and that&#8217;s certainly not in the best interests of Apple\u00a0or Mac users.<\/p>\n<h3>Can\u00a0We Still Trust the App Store?<\/h3>\n<p>Even if you&#8217;ve never used Calendar 2, this story serves as a reminder that Apple&#8217;s app review processes\u2014and the humans who review apps\u2014are not infallible.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/3DW_MaoCmGU?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>Although such\u00a0occurrences may not happen very often, users should always exercise caution when installing any third-party app.<\/p>\n<p>Read reviews first, and make sure the software seems reputable before you choose to download it. For further tips on how to avoid unwanted cryptocurrency mining\u00a0on a Mac, see\u00a0<a href=\"https:\/\/youtu.be\/3DW_MaoCmGU\" target=\"_blank\" rel=\"noopener\">Intego&#8217;s latest YouTube video<\/a>\u00a0for a brief tutorial.<\/p>\n<p><strong>In spite of the recent incident,\u00a0the App Store nevertheless remains one of the safest places to obtain Mac software.<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76243\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper-150x67.png\" alt=\"\" width=\"150\" height=\"67\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper-150x67.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper-300x134.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper.png 647w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>The Mac App Store\u00a0is certainly safer than download aggregation sites, as we were <a title=\"Month in Review: Apple Security in February 2018\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/\" target=\"_blank\" rel=\"noopener\">reminded in February<\/a> when MacUpdate mistakenly distributed malware-infected copies of Firefox and two utility apps, OnyX and Deeper.<\/p>\n<p>Download aggregation\u00a0sites are also notorious for displaying confusing advertisements with fake download buttons, so there&#8217;s an increased risk of accidentally downloading adware or other potentially unwanted software.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76804\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated.png\" alt=\"\" width=\"2248\" height=\"1264\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated.png 2248w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated-300x169.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated-768x432.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated-1024x576.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Download_com-VLC-player-cropped-annotated-657x369.png 657w\" sizes=\"(max-width: 2248px) 100vw, 2248px\" \/><\/p>\n<p style=\"text-align: center;\">CNET&#8217;s ad-laden Download\u00a0site can be a digital minefield.<\/p>\n<p>The rule of thumb discussed in our\u00a0January\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=P5m8wsQ5BFw\" target=\"_blank\" rel=\"noopener\">video interview<\/a> with Amit Serper is still good advice:<\/p>\n<ol>\n<li>Obtain apps through the Mac App Store when possible.<\/li>\n<li>When you need an app that isn&#8217;t in the Mac App Store, the safest place to obtain\u00a0the app\u00a0is the developer&#8217;s official site.<\/li>\n<\/ol>\n<p>Be sure to\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to the\u00a0<strong>Intego Mac Podcast<\/strong>\u00a0for weekly audio discussions of topics like this, and\u00a0<a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\">subscribe<\/a>\u00a0to\u00a0the\u00a0<strong>Intego YouTube channel<\/strong>\u00a0to get informative video updates\u2014click on\u00a0YouTube&#8217;s bell\u00a0icon (?)\u00a0to get notified when each new\u00a0video is available.<\/p>\n<p><em><strong>Have something to say about this story? Share your comments below!<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qbix, Inc.&#8217;s app Calendar 2, available in the Mac App Store, includes a new &#8220;feature&#8221; that uses your Mac&#8217;s processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.<\/p>\n","protected":false},"author":14,"featured_media":76828,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,5],"tags":[317,3991,3985,4162,4156,79,3988,3982,3994],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Qbix, Inc.&#039;s app Calendar 2, available in the Mac App Store, includes a new &quot;feature&quot; that uses your Mac&#039;s processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unwanted cryptomining debuts (briefly) in Mac App Store - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Qbix, Inc.&#039;s app Calendar 2, available in the Mac App Store, includes a new &quot;feature&quot; that uses your Mac&#039;s processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-21T15:27:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-18T10:19:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png\",\"width\":400,\"height\":260,\"caption\":\"Qbix Calendar 2 Mac App Cryptomining\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/\",\"name\":\"Unwanted cryptomining debuts (briefly) in Mac App Store - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#primaryimage\"},\"datePublished\":\"2018-03-21T15:27:14+00:00\",\"dateModified\":\"2024-04-18T10:19:56+00:00\",\"description\":\"Qbix, Inc.'s app Calendar 2, available in the Mac App Store, includes a new \\\"feature\\\" that uses your Mac's processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unwanted cryptomining debuts (briefly) in Mac App Store\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Unwanted cryptomining debuts (briefly) in Mac App Store\",\"datePublished\":\"2018-03-21T15:27:14+00:00\",\"dateModified\":\"2024-04-18T10:19:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#webpage\"},\"wordCount\":1280,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png\",\"keywords\":[\"App Store\",\"Calendar 2\",\"Cryptocurrency\",\"Cryptojacking\",\"Cryptominer\",\"Mac App Store\",\"Monero\",\"OSX\/Miner\",\"Qbix\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Qbix, Inc.'s app Calendar 2, available in the Mac App Store, includes a new \"feature\" that uses your Mac's processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/","og_locale":"en_US","og_type":"article","og_title":"Unwanted cryptomining debuts (briefly) in Mac App Store - The Mac Security Blog","og_description":"Qbix, Inc.'s app Calendar 2, available in the Mac App Store, includes a new \"feature\" that uses your Mac's processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-03-21T15:27:14+00:00","article_modified_time":"2024-04-18T10:19:56+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png","width":400,"height":260,"caption":"Qbix Calendar 2 Mac App Cryptomining"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/","name":"Unwanted cryptomining debuts (briefly) in Mac App Store - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#primaryimage"},"datePublished":"2018-03-21T15:27:14+00:00","dateModified":"2024-04-18T10:19:56+00:00","description":"Qbix, Inc.'s app Calendar 2, available in the Mac App Store, includes a new \"feature\" that uses your Mac's processing power to mine for the Monero cryptocurrency (similar to Bitcoin) on behalf of the developer.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Unwanted cryptomining debuts (briefly) in Mac App Store"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Unwanted cryptomining debuts (briefly) in Mac App Store","datePublished":"2018-03-21T15:27:14+00:00","dateModified":"2024-04-18T10:19:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#webpage"},"wordCount":1280,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png","keywords":["App Store","Calendar 2","Cryptocurrency","Cryptojacking","Cryptominer","Mac App Store","Monero","OSX\/Miner","Qbix"],"articleSection":["Malware","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/unwanted-cryptomining-debuts-briefly-in-mac-app-store\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Qbix-Calendar-2-Cryptomining.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jYx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76789"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=76789"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76789\/revisions"}],"predecessor-version":[{"id":97370,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76789\/revisions\/97370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/76828"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=76789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=76789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=76789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}