{"id":78019,"date":"2018-05-03T13:41:47","date_gmt":"2018-05-03T20:41:47","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=78019"},"modified":"2018-05-03T13:41:47","modified_gmt":"2018-05-03T20:41:47","slug":"caution-mac-specific-hack-tool-mettle-discovered","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/","title":{"rendered":"Caution: Mac-specific Hack Tool Mettle Discovered"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-78268\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Mac-Hack-Tool-Mettle.png\" alt=\"Mac Hack Tool Mettle\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Mac-Hack-Tool-Mettle.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Mac-Hack-Tool-Mettle-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Mac-Hack-Tool-Mettle-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Security researchers have discovered a Mac specific implementation of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/beyond-malware-detecting-hack-tools\/\" target=\"_blank\">hacking tool<\/a> Meterpreter, called Mettle.\u00a0As <a href=\"https:\/\/github.com\/rapid7\/mettle\" target=\"_blank\">described<\/a> by its creator,\u00a0&#8220;[Mettle] can run on the smallest embedded Linux targets to big iron, and targets Android, iOS, macOS, Linux, and Windows, but can be ported to almost any POSIX-compliant environment.&#8221;<\/p>\n<p>Meterpreter is a tool packaged together with the popular Metasploit Framework, a versatile penetration testing software suite that can be used to test a network&#8217;s security defenses, expose vulnerabilities and exploit them, if desired.<\/p>\n<p>Metasploit\u00a0is very useful software\u00a0for those who\u00a0wish to harden and defend a network;\u00a0unfortunately, it is an equally useful tool for those who\u00a0wish to break into a network and cause havoc.\u00a0Meterpreter is one of the payloads that Metasploit uses, which allows a\u00a0user to execute a number of commands on a\u00a0target system.<\/p>\n<h3>What is the infection vector?<\/h3>\n<p>This can really be anything from a fake Adobe Flash Player that drops this backdoor, an \u201cevil maid\u201d attack in which someone with physical access installs it, or a hack.<\/p>\n<p>If Mettle ends up on your Mac and is used in conjunction with MetaSploit, chances are the prime suspect is phishing or spear phishing. There is a possibility that your IT staff used this as part of a test for system and network security, so if your Mac falls under the care of such staff, check with them right away. If this came from them, they&#8217;ll probably be happy to see you discovered it. If it did not come from them, they&#8217;ll want to investigate immediately to see if there has been a data breach.<\/p>\n<h3>About OSX\/Mettle.A<\/h3>\n<p>Mettle is a Mach-O (short for Mach object file format), meaning it was developed specifically for the Mac. This can be a port from another platform, similar to what\u00a0we saw with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/snake-malware-ported-from-windows-to-mac\/\" target=\"_blank\">Snake malware<\/a>. This Mach-O is the exploit layer used to gain access to a target system.\u00a0<a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\">Intego VirusBarrier<\/a> identifies and eradicates this threat\u00a0as <strong>OSX\/Mettle.A<\/strong>.<\/p>\n<p>Once access is provided by Mettle, the attacker can perform a wide range of tasks, including the ability to upload and download files, log keystrokes, search for files, execute scripts, take screenshots, access the camera, and much more. Because\u00a0users can write their own scripts for Mettle, its functionality is only limited by the skills of the user who\u00a0controls it.<\/p>\n<p>Meterpreter and Mettle are difficult to detect on a system as it creates no files on the hard disk. It runs completely from memory (RAM) and attaches itself to a process. Unless you are\u00a0looking for it, you probably won&#8217;t know it&#8217;s there. Your Mac&#8217;s memory is not scanned by antivirus software, so you may wonder,\u00a0how can\u00a0Intego detect it?<\/p>\n<p>If Mettle finds its way onto your system as part of other malware\u2014if it touches your hard drive in any way\u2014it will be picked up immediately by VirusBarrier&#8217;s\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\">Real-Time scanner<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-78025 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Mettle-Detection.png\" alt=\"\" width=\"634\" height=\"299\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Mettle-Detection.png 634w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Mettle-Detection-150x71.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/01-Mettle-Detection-300x141.png 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/p>\n<p>If Mettle is executed from memory, while antivirus software\u00a0would not\u00a0detect it, Intego\u00a0NetBarrier (two way firewall) will detect\u00a0the network activity when Mettle opens the backdoor and waits for commands to come in from a remote server. (This highlights\u00a0the importance of having<a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\" target=\"_blank\" rel=\"noopener\"> a layered approach to security<\/a>.)<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-78031 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Mettle-Network-Detection.png\" alt=\"\" width=\"668\" height=\"320\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Mettle-Network-Detection.png 668w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Mettle-Network-Detection-150x72.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Mettle-Network-Detection-300x144.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/02-Mettle-Network-Detection-657x315.png 657w\" sizes=\"(max-width: 668px) 100vw, 668px\" \/><\/p>\n<p>Upon inspecting Mettle&#8217;s behavior, we found that it was attempting to receive commands from an Amazon hosted server.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-78046 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Mettle-Network-Detection-2.png\" alt=\"\" width=\"668\" height=\"409\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Mettle-Network-Detection-2.png 668w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Mettle-Network-Detection-2-150x92.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Mettle-Network-Detection-2-300x184.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/03-Mettle-Network-Detection-2-657x402.png 657w\" sizes=\"(max-width: 668px) 100vw, 668px\" \/><\/p>\n<p>While there are legitimate purposes for tools like\u00a0Metasploit, the potential for\u00a0this security suite to be\u00a0turned against you, rather than being used to help you, is unfortunately far greater. Mettle was not created with a malicious purpose in mind, in fact, Rapid7 is a big player in the security industry that has a range of services to help improve security for organizations. However, just because Mettle was created with good intentions does not mean it won&#8217;t be used\u00a0with bad intentions.<\/p>\n<p><strong>Samples used for analysis:<\/strong><br \/>\n08ae98aab06477f1d2622ec7f2c590ec17b8582308c657db51782d6d5963ec27<br \/>\n58a80594603607ed330049187085b84f15513b96b2335f588ca1b28dc2c15576<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\u00a0As described by its creator,\u00a0&#8220;[Mettle] can run on the smallest embedded Linux targets to big iron, and targets Android, iOS, macOS, Linux, and Windows, but can be ported to almost any POSIX-compliant environment.&#8221; Meterpreter is a tool packaged together with the [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":78235,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4129,4126,4132,4135],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\u00a0As described by its creator,\u00a0&quot; can run\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caution: Mac-specific Hack Tool Mettle Discovered - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\u00a0As described by its creator,\u00a0&quot; can run\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-03T20:41:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"OSX\/Mettle.A\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/\",\"name\":\"Caution: Mac-specific Hack Tool Mettle Discovered - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#primaryimage\"},\"datePublished\":\"2018-05-03T20:41:47+00:00\",\"dateModified\":\"2018-05-03T20:41:47+00:00\",\"description\":\"Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\\u00a0As described by its creator,\\u00a0\\\" can run\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Caution: Mac-specific Hack Tool Mettle Discovered\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Caution: Mac-specific Hack Tool Mettle Discovered\",\"datePublished\":\"2018-05-03T20:41:47+00:00\",\"dateModified\":\"2018-05-03T20:41:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#webpage\"},\"wordCount\":673,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png\",\"keywords\":[\"Metasploit\",\"Meterpreter\",\"Mettle\",\"OSX\/Mettle.A\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\u00a0As described by its creator,\u00a0\" can run","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/","og_locale":"en_US","og_type":"article","og_title":"Caution: Mac-specific Hack Tool Mettle Discovered - The Mac Security Blog","og_description":"Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\u00a0As described by its creator,\u00a0\" can run","og_url":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-05-03T20:41:47+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png","width":400,"height":260,"caption":"OSX\/Mettle.A"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/","name":"Caution: Mac-specific Hack Tool Mettle Discovered - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#primaryimage"},"datePublished":"2018-05-03T20:41:47+00:00","dateModified":"2018-05-03T20:41:47+00:00","description":"Security researchers have discovered a Mac specific implementation of the hacking tool Meterpreter, called Mettle.\u00a0As described by its creator,\u00a0\" can run","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Caution: Mac-specific Hack Tool Mettle Discovered"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Caution: Mac-specific Hack Tool Mettle Discovered","datePublished":"2018-05-03T20:41:47+00:00","dateModified":"2018-05-03T20:41:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#webpage"},"wordCount":673,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png","keywords":["Metasploit","Meterpreter","Mettle","OSX\/Mettle.A"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/caution-mac-specific-hack-tool-mettle-discovered\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/OSX.Mettle.A-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kin","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/78019"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=78019"}],"version-history":[{"count":44,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/78019\/revisions"}],"predecessor-version":[{"id":78169,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/78019\/revisions\/78169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/78235"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=78019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=78019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=78019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}