{"id":77743,"date":"2018-04-24T11:45:09","date_gmt":"2018-04-24T18:45:09","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=77743"},"modified":"2018-04-24T11:45:09","modified_gmt":"2018-04-24T18:45:09","slug":"new-osxshlayer-malware-variant-found-using-a-dirty-new-trick","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/","title":{"rendered":"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-75826\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo.png\" alt=\"OSX\/Shlayer Mac Malware\" width=\"1525\" height=\"900\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo.png 1525w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-300x177.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-768x453.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-1024x604.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-657x388.png 657w\" sizes=\"(max-width: 1525px) 100vw, 1525px\" \/><\/p>\n<p>Last\u00a0February, Intego researchers<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" target=\"_blank\"> discovered<\/a> a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems with adware. OSX\/Shlayer was also found in torrent downloads as part of (or pretending to be) software cracks.<\/p>\n<p>Today, Thomas Reed <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/new-crossrider-variant-installs-configuration-profiles-on-macs\/\" target=\"_blank\">reported<\/a> on a new variant\u00a0of OSX\/Shlayer that uses new tricks to get its job done. It installs a configuration profile that forces a browser&#8217;s homepage to be set as &#8220;chumsearch[dot]com.&#8221; This profile would take control of the homepage settings in Safari and Chrome and also set the &#8220;Open new window with&#8221; or &#8220;Open new tab with&#8221; settings to use the Chumsearch URL. While we did not observe this behavior in our tests, we did find a few other interesting things.<\/p>\n<h3>How are Macs getting infected?<\/h3>\n<p>As with the previously discovered Shlayer malware variants, this one comes as either a fake Adobe Flash Player\u00a0or\u00a0a crack (patch) to some kind of paid software. To pick up one of these fake Adobe Flash Player installers, one must wander around <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" target=\"_blank\">BitTorrent sites<\/a> and it&#8217;ll surely pop up.<\/p>\n<p>To obtain Shlayer as part of a software crack,\u00a0BitTorrent\u00a0sites are also to blame. This is not to say that this malware variant, or any other variants, can&#8217;t be found on other possibly legit websites, but we\u00a0have yet to spot Shlayer there.<\/p>\n<p>Once a user is tricked into downloading the fake Adobe Flash Player (or a site downloads it automatically), the result is typically a self mounting disk image. The user is then presented with a window that looks mostly like this:<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77749 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Fake-Flash-Player-Installer.png\" alt=\"\" width=\"612\" height=\"635\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Fake-Flash-Player-Installer.png 612w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Fake-Flash-Player-Installer-145x150.png 145w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Fake-Flash-Player-Installer-289x300.png 289w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Fake-Flash-Player-Installer-32x32.png 32w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/p>\n<p>Once the installer is launched, an agreement will pop up that looks absolutely nothing like the one included in the real Adobe Flash Player installer, and two installation types are offered: Express (recommended) or Custom Installation (expert). The wording is, of course, carefully chosen to deter users from selecting the Custom Installation option and seeing what is really being installed.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77755 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-1-Fake-Flash-Player-Installer-Agreement.png\" alt=\"\" width=\"314\" height=\"104\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-1-Fake-Flash-Player-Installer-Agreement.png 314w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-1-Fake-Flash-Player-Installer-Agreement-150x50.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-1-Fake-Flash-Player-Installer-Agreement-300x99.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/><\/p>\n<p>Even without scrolling through it, you can tell the presented agreement does not reference Adobe Flash Player, instead it references Advanced Mac Cleaner. This should be a big red flag, but most users may be\u00a0so accustomed to quickly\u00a0clicking &#8220;OK,&#8221; &#8220;Continue&#8221; and &#8220;Agree&#8221; to finally get their installation going.\u00a0(These windows could mention irrefutable proof Bigfoot exists and in all likelihood no-one would notice.)<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77761 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Fake-Flash-Player-Installer-Agreement.png\" alt=\"\" width=\"782\" height=\"574\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Fake-Flash-Player-Installer-Agreement.png 782w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Fake-Flash-Player-Installer-Agreement-150x110.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Fake-Flash-Player-Installer-Agreement-300x220.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Fake-Flash-Player-Installer-Agreement-768x564.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Fake-Flash-Player-Installer-Agreement-657x482.png 657w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/><\/p>\n<p>When the &#8220;Accept &gt;&gt;&#8221; button is clicked, the user will be presented with a password request.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77767 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Fake-Flash-Player-Installer-Password.png\" alt=\"\" width=\"560\" height=\"340\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Fake-Flash-Player-Installer-Password.png 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Fake-Flash-Player-Installer-Password-150x91.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Fake-Flash-Player-Installer-Password-300x182.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>And when the &#8220;Ok&#8221; button is clicked, the installer will take over. A window will cover most of the screen and display a progress bar asking the user to please wait. This window cannot be activated, moved or closed.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77773 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/04-Fake-Flash-Player-Installer-Installing.png\" alt=\"\" width=\"670\" height=\"462\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/04-Fake-Flash-Player-Installer-Installing.png 670w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/04-Fake-Flash-Player-Installer-Installing-150x103.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/04-Fake-Flash-Player-Installer-Installing-300x207.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/04-Fake-Flash-Player-Installer-Installing-657x453.png 657w\" sizes=\"(max-width: 670px) 100vw, 670px\" \/><\/p>\n<h3>What does OSX\/Shlayer install?<\/h3>\n<p>With the installer window open, several components are downloaded in the background. This includes all or some of the following:<\/p>\n<ul>\n<li>Chumsearch Safari Extension (though proper installation only worked once)<\/li>\n<li>MyShopCoupon+ (this fails to install and ends up in the root of the startup drive)<\/li>\n<li>Advanced Mac Cleaner (ends up in the Applications folder)<\/li>\n<li>mediaDownloader (ends up in the Applications folder)<\/li>\n<li>MyMacUpdater (ends up in the Applications folder)<\/li>\n<li>An actual Adobe Flash Player installer (mounts on the desktop)<\/li>\n<\/ul>\n<p>It also adjusts the Homepage in Safari, and probably Chrome and other browsers as well, to:<\/p>\n<p style=\"padding-left: 60px;\">http: \/\/www.chumsearch. com\/search\/?asset=hp&amp;wtguid=61409200915943979&amp;wtsrc=5409&amp;wtdt=042318&amp;wtbr=1&amp;wtpl=10.12.6&amp;v=5.0<\/p>\n<p>However, it\u00a0fails to make further adjustments that would cause new windows or tabs to load this URL.<\/p>\n<p><b>Chumsearch<\/b>\u00a0mimics a (very poor) Google search website, which will pop up any time the homepage is requested. This page also features an ad from another company, which should raise red flags right away.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77779 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/05-ChumSearch-Homepage.png\" alt=\"\" width=\"926\" height=\"746\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/05-ChumSearch-Homepage.png 926w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/05-ChumSearch-Homepage-150x121.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/05-ChumSearch-Homepage-300x242.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/05-ChumSearch-Homepage-768x619.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/05-ChumSearch-Homepage-657x529.png 657w\" sizes=\"(max-width: 926px) 100vw, 926px\" \/><\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects Chumsearch and all of its components as <strong>OSX\/Chumsearch<\/strong>.<br \/>\n<strong><br \/>\nAdvanced Mac Cleaner<\/strong> is scareware. It shows a scanner that found a lot of issues on your Mac and, of course, claims that the way to fix all these issues is by paying up to $107. This application will pop up after every restart.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-77785 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/06-AMC-Dashboard.png\" alt=\"\" width=\"952\" height=\"674\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/06-AMC-Dashboard.png 952w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/06-AMC-Dashboard-150x106.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/06-AMC-Dashboard-300x212.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/06-AMC-Dashboard-768x544.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/06-AMC-Dashboard-657x465.png 657w\" sizes=\"(max-width: 952px) 100vw, 952px\" \/><\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects Advanced Mac Cleaner and all of its components as <strong>OSX\/AMC.fs<\/strong>.<\/p>\n<p><strong>MyMacUpdater<\/strong> is another Potentially Unwanted Program (PUP), which did not install in this particular round of testing. However, we have encountered it before and Intego VirusBarrier detects it as <strong>OSX\/Bundlore<\/strong>.<\/p>\n<p>OSX\/Shlayer is simply\u00a0the dropper that acts as the gateway to your system and installs a host of other components, such as those mentioned above. This variant uses double base64 encoding to make it harder for malware researchers to, well, research. For example, the Shlayer installer is called on this path:<\/p>\n<blockquote class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"panel code\">\n<div class=\"codeContent panelContent\">\n<pre class=\"code-java\"><span style=\"font-family: Arial;\"><span class=\"code-quote\">\"YlcwdGFXNXpkR0ZzYkMxdFlXTnZjeTVoY0hBdlEyOXVkR1Z1ZEhNdlRXRmpUMU12YlcwdGFXNXpkR0ZzYkMxdFlXTnZjd289Cg==\"<\/span><\/span><\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n<p>Which\u00a0is an encoded version of:<\/p>\n<blockquote class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"panel code\">\n<div class=\"codeContent panelContent\">\n<pre class=\"code-java\"><span style=\"font-family: Arial;\">bW0taW5zdGFsbC1tYWNvcy5hcHAvQ29udGVudHMvTWFjT1MvbW0taW5zdGFsbC1tYWNvcwo=<\/span><\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n<p>Which is an encoded version of:<\/p>\n<blockquote class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"\">\n<div class=\"panel code\">\n<div class=\"codeContent panelContent\">\n<pre class=\"code-java\"><span style=\"font-family: Arial;\">mm-install-macos.app\/Contents\/MacOS\/mm-install-macos<\/span><\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n<p>By double encoding data, it doesn&#8217;t fool automated processes, but it makes the discovery and analysis by humans a bit trickier.<\/p>\n<p>According to\u00a0Thomas Reed, this new Shlayer variant uses a new trick.<\/p>\n<blockquote><p>In the case of this Crossrider variant, the configuration profile that is installed forces both Safari and Chrome to always open to a page on chumsearch[dot]com. This also prevents the user from changing that behavior in the browser\u2019s settings.<\/p><\/blockquote>\n<div id=\"attachment_77806\" style=\"width: 1347px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-77806\" loading=\"lazy\" class=\"size-full wp-image-77806\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418.png\" alt=\"\" width=\"1337\" height=\"875\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418.png 1337w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418-150x98.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418-300x196.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418-768x503.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418-1024x670.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Crossrider-Mac-profile-20180418-657x430.png 657w\" sizes=\"(max-width: 1337px) 100vw, 1337px\" \/><p id=\"caption-attachment-77806\" class=\"wp-caption-text\">Image credit: Thomas Reed<\/p><\/div>\n<p>This is not behavior we were able to reproduce, but we have seen\u00a0at least one other report of this configuration profile being installed by a web developer in the MacAdmins Slack.<\/p>\n<h3>Should Mac users be concerned about OSX\/Shlayer?<\/h3>\n<p>Currently, Shlayer has been found only on BitTorrent websites, disguised as fake Adobe Flash Player installers or embedded in downloaded torrent files posing as cracks. Therefore, if you do not frequent such websites\u2014and you shouldn\u2019t because <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" target=\"_blank\">BitTorrent sites are a malware cesspool<\/a>\u2014chances of infection are at the moment very low.<\/p>\n<p>If there is an increased risk of infection, users should be concerned. The injecting of ads and hijacking of the homepage are just one aspect of this malware. The Safari and Chrome extensions can do the following:<\/p>\n<ul>\n<li>Read content from webpages you visit<\/li>\n<li>Modify content on webpages you visit<\/li>\n<li>Transmit content from webpages you visit<\/li>\n<\/ul>\n<p>This includes names, passwords, phone numbers, email addresses, credit card details and much more. Having your online bank statement or Amazon login details transmitted to an unknown party is\u00a0certainly\u00a0not ideal.<\/p>\n<h3>How to tell if your Mac is infected (and removal instructions)<\/h3>\n<p>A dropper like Shlayer can download and install anything it wants. The components that end up on your Mac are dictated by the servers it connects to and the instructions programmed into it. These kinds of installer are also constantly modified to include new techniques (such as the one found by Thomas Reed) and install new components. As such, it is not possible to give a definitive list of components to search for, but in the case of this particular OSX\/Shlayer variant, we know of these components:<\/p>\n<ul>\n<li>\/Applications\/Advanced Mac Cleaner<\/li>\n<li>\/Applications\/MyMacUpdater<\/li>\n<li>\/Applications\/MyShopcoupon<\/li>\n<li>\/Applications\/mediaDownloader<\/li>\n<li>\/Library\/LaunchAgents\/com.MyMacUpdater.agent.plist<\/li>\n<li>\/Library\/LaunchAgents\/com.MyShopcoupon.agent.plist<\/li>\n<li>~ Library\/LaunchAgents\/com.pcv.hlpramcn.plist<\/li>\n<li>~ Library\/Safari\/Extensions\/Chumsearch+.safariextz<\/li>\n<li>~ Library\/Application Support\/amc<\/li>\n<li>~ Library\/Caches\/com.apple.Safari\/Extensions\/Chumsearch+.safariextension<\/li>\n<li>\/myshopcoupon.safariextz<\/li>\n<li>\/mm-plugin.dylib<br \/>\n<strong>In case you did stumble upon the particular installer Thomas Reed mentions, also have a look here:<\/strong><\/li>\n<li><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">Open System Preferences and look for &#8220;Profiles&#8221;. If a profiles option is available, click on it and look for profiles that don&#8217;t belong (there might be legitimate profiles there if your Mac is managed by your work and\/or an IT staff). In this case look for &#8220;AdminPrefs&#8221;, select it and click the &#8220;-&#8221; to remove it. If your Mac is managed by an IT staff, contact them to have them remove it or give you the OK to remove it yourself. IT admins can find removal instructions in <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/new-crossrider-variant-installs-configuration-profiles-on-macs\/\" target=\"_blank\">Reed&#8217;s report<\/a>.<\/span><strong><br \/>\n<\/strong><\/span><\/li>\n<li>And finally don&#8217;t forget to delete the original file that got Shlayer on your Mac in the first place. This will most likely reside in your Downloads folder<\/li>\n<\/ul>\n<p>If any of these components are\u00a0found on your Mac, delete them, restart your Mac and empty the trash.<\/p>\n<h3>How to protect yourself from OSX\/Shlayer<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects and eradicates this new malware variant (and several others) as <strong>OSX\/Shlayer.C.<\/strong>\u00a0Use of\u00a0Intego&#8217;s\u00a0anti-virus software\u00a0will block and remove all known components of Shlayer malware.\u00a0Also using a two-way firewall solution, such as Intego NetBarrier, can offer additional protection as it will alert you of any connection attempts to\/from applications on your Mac, which allows you to spot suspect behavior and block it before personal data escapes your computer.<\/p>\n<p>We strongly encourage you to stay away from <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" target=\"_blank\">BitTorrent<\/a> sites as this\u00a0will reduce your exposure to malware significantly. You may also consider avoiding the use of\u00a0Adobe Flash Player in general, so you won&#8217;t be tempted to install a fake Flash Player update that&#8217;s riddled with malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems with adware. OSX\/Shlayer was also found in torrent downloads as part of (or pretending to be) software cracks. Today, Thomas Reed reported on a new variant\u00a0of OSX\/Shlayer that uses new tricks to get its [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":52474,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[3565,4084,2677,4087,4096,4090,3928,4093,4081],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-24T18:45:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/\",\"name\":\"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#primaryimage\"},\"datePublished\":\"2018-04-24T18:45:09+00:00\",\"dateModified\":\"2018-04-24T18:45:09+00:00\",\"description\":\"Last\\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\\u00a0disguising itself as an Adobe Flash Player update to infect systems\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick\",\"datePublished\":\"2018-04-24T18:45:09+00:00\",\"dateModified\":\"2018-04-24T18:45:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#webpage\"},\"wordCount\":1495,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"keywords\":[\"BitTorrent\",\"Chumsearch\",\"Fake Flash Player\",\"OSX\/AMC.fs\",\"OSX\/Bundlore\",\"OSX\/Chumsearch\",\"OSX\/Shlayer\",\"OSX\/Shlayer.C\",\"Shlayer\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/","og_locale":"en_US","og_type":"article","og_title":"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick - The Mac Security Blog","og_description":"Last\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-04-24T18:45:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","width":400,"height":260,"caption":"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/","name":"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#primaryimage"},"datePublished":"2018-04-24T18:45:09+00:00","dateModified":"2018-04-24T18:45:09+00:00","description":"Last\u00a0February, Intego researchers discovered a new variant of the OSX\/Shlayer malware,\u00a0disguising itself as an Adobe Flash Player update to infect systems","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"New OSX\/Shlayer Malware Variant Found Using a Dirty New Trick","datePublished":"2018-04-24T18:45:09+00:00","dateModified":"2018-04-24T18:45:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#webpage"},"wordCount":1495,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","keywords":["BitTorrent","Chumsearch","Fake Flash Player","OSX\/AMC.fs","OSX\/Bundlore","OSX\/Chumsearch","OSX\/Shlayer","OSX\/Shlayer.C","Shlayer"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kdV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/77743"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=77743"}],"version-history":[{"count":27,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/77743\/revisions"}],"predecessor-version":[{"id":77800,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/77743\/revisions\/77800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52474"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=77743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=77743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=77743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}