{"id":80641,"date":"2018-07-06T13:25:53","date_gmt":"2018-07-06T20:25:53","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=80641"},"modified":"2019-06-15T02:49:16","modified_gmt":"2019-06-15T09:49:16","slug":"new-mac-malware-targets-cryptocoin-dummies","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/","title":{"rendered":"New Mac malware targets cryptocoin &#8216;dummies&#8217;"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-80683\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-logo-background-1024x683.png\" alt=\"\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-logo-background-1024x683.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-logo-background-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-logo-background-300x200.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-logo-background-768x512.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-logo-background-657x438.png 657w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><em>Mac malware for dummies?<\/em>\u00a0No, it&#8217;s not the latest volume in Wiley&#8217;s book series.<\/p>\n<p><strong>OSX\/Dummy<\/strong> is new Mac malware that rudely refers to its victims as dummies (more specifically, &#8220;dumpdummy&#8221;).<\/p>\n<p>Below we&#8217;ll cover everything you need to know\u00a0about the latest macOS malware threat.<\/p>\n<h3>OSX\/Dummy&#8217;s Attack Vector<\/h3>\n<p>How is OSX\/Dummy spreading? Well, it has an unusual attack vector, to be sure.<\/p>\n<p>Cryptocurrency chat groups hosted on popular platforms Slack and Discord have recently been targeted by a threat actor. A perpetrator pretends to be a chat group administrator or someone important, inviting chat participants to run a command in the Terminal on their Macs to supposedly &#8220;make sure [a] port is open&#8221; to enable a cryptocurrency transaction to finish processing.<\/p>\n<div id=\"attachment_80653\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-80653\" loading=\"lazy\" class=\"size-large wp-image-80653\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped-1024x212.png\" alt=\"\" width=\"1024\" height=\"212\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped-1024x212.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped-150x31.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped-300x62.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped-768x159.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped-657x136.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-scam-screenshot-cropped.png 1293w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-80653\" class=\"wp-caption-text\">OSX\/Dummy spreads via a rudimentary social engineering attack. Image: <a href=\"https:\/\/isc.sans.edu\/diary\/23816\" target=\"_blank\" rel=\"noopener\">Remco Verhoef<\/a><\/p><\/div>\n<p>When unsuspecting victims run the command, their Mac may become infected with the new malware, OSX\/Dummy.<\/p>\n<p>This methodology of infection through social engineering, although very rudimentary in nature, is arguably slightly clever in that it circumvents Apple&#8217;s Gatekeeper protection. Gatekeeper is supposed to block execution of known-malicious and unsigned code obtained from the Internet. While Gatekeeper might block malware from certain sources, it is not designed to block code downloaded via the Terminal.<\/p>\n<h3>What Does OSX\/Dummy Do?<\/h3>\n<p>When the user types his or her password into the Terminal, the malware logs it in plain text to a new file, located at \/tmp\/dumpdummy.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"size-full wp-image-80656\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-plaintext-password.png\" alt=\"\" width=\"209\" height=\"55\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-plaintext-password.png 209w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-plaintext-password-150x39.png 150w\" sizes=\"(max-width: 209px) 100vw, 209px\" \/> <a href=\"https:\/\/objective-see.com\/blog\/blog_0x32.html\" target=\"_blank\" rel=\"noopener\"><br \/>\nPatrick Wardle<\/a> shows that OSX\/Dummy stores passwords in plain text.<\/p>\n<p>The malware also establishes a method of persistence so that it can survive a reboot.<\/p>\n<p>OSX\/Dummy then attempts to open a reverse shell connection to an attacker-controlled computer. A successful reverse shell connection could allow the attacker to execute any commands of their choosing on the victim&#8217;s Mac, with full root privileges.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-80659\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-150x150.png\" alt=\"\" width=\"130\" height=\"130\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/pickpocket-stealing-wallet.png 240w\" sizes=\"(max-width: 130px) 100vw, 130px\" \/>In other words, the attacker can\u00a0control the victim&#8217;s Mac\u00a0like a puppet\u2014a dummy.<\/p>\n<p>The\u00a0attacker could even\u00a0do things like steal the victim&#8217;s cryptocurrency wallets (which might perhaps be a primary goal in this campaign, judging by the forums trolled by the attacker).<\/p>\n<h3>What Can Mac Users Learn From This?<\/h3>\n<p>The most important takeaway for Mac users is that <strong>your computer isn&#8217;t invincible<\/strong>\u2014you have to be just as cautious as a Windows user to prevent your computer from getting infected.<\/p>\n<p>Fraudsters prey on those who are most likely to be vulnerable to their scam tactics, including Mac users who may be overly confident about their computer&#8217;s security or overly trusting of people in chat channels or forums.<\/p>\n<p>And, of course, <strong>don&#8217;t run Terminal commands<\/strong> that you&#8217;ve found in some random place online; they could be malicious!<\/p>\n<h3>Is My Mac Safe?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-61210\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open.jpg\" alt=\"\" width=\"150\" height=\"154\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open.jpg 201w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open-146x150.jpg 146w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Unfortunately, Apple&#8217;s built-in technologies such as Gatekeeper and XProtect won&#8217;t stop this malware from infecting your Mac.<\/p>\n<p>However, <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a> detects and eradicates OSX\/Dummy&#8217;s files, and Intego NetBarrier can empower you to block the outbound network connection if some new malware ever tries to phone home.<\/p>\n<p>If you don&#8217;t have an anti-malware suite installed on your Mac, you can check for the presence of the following files to see whether your Mac is currently infected:<\/p>\n<pre>\/Library\/LaunchDaemons\/com.startup.plist\r\n\/tmp\/com.startup.plist\r\n\/tmp\/dumpdummy\r\n\/tmp\/script.sh\r\n\/Users\/Shared\/dumpdummy\r\n\/var\/root\/script.sh<\/pre>\n<p>Network administrators can also check their logs to see if any computers have attempted to phone home to the IP address 185.243.115.230 on port 1337.<\/p>\n<h3>Where\u00a0Can I Learn More?<\/h3>\n<p><a href=\"https:\/\/isc.sans.edu\/diary\/23816\" target=\"_blank\" rel=\"noopener\">Remco Verhoef<\/a>\u00a0was the first to publish a report about OSX\/Dummy, and <a href=\"https:\/\/objective-see.com\/blog\/blog_0x32.html\" target=\"_blank\" rel=\"noopener\">Patrick Wardle<\/a>\u00a0followed up with additional analysis.<\/p>\n<p>Be sure to subscribe to\u00a0<strong>The Mac Security Blog,<\/strong>\u00a0the\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, and\u00a0the\u00a0<a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\"><strong>Intego YouTube channel<\/strong><\/a>\u00a0to stay\u00a0informed about\u00a0the latest Apple security news! We talked about\u00a0OSX\/Dummy on\u00a0<a href=\"http:\/\/podcast.intego.com\/38\" target=\"_blank\" rel=\"noopener\">episode 38<\/a> of the podcast.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: x-small;\">Dummy photo\u00a0by\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/andrewmalone\/3147787198\" target=\"_blank\" rel=\"noopener\">Andrew Malone<\/a>. &#8220;Beware of pickpockets&#8221; image by\u00a0<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Attention_aux_pickpockets.svg\" target=\"_blank\" rel=\"noopener\">Paris 16<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac malware for dummies?\u00a0No, it&#8217;s not the latest volume in Wiley&#8217;s book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies (more specifically, &#8220;dumpdummy&#8221;). Below we&#8217;ll cover everything you need to know\u00a0about the latest macOS malware threat. OSX\/Dummy&#8217;s Attack Vector How is OSX\/Dummy spreading? Well, it has an unusual attack [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":80692,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[174,86,4240,3172],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Mac malware for dummies?\u00a0No, it&#039;s not the latest volume in Wiley&#039;s book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Mac malware targets cryptocoin &#039;dummies&#039; - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Mac malware for dummies?\u00a0No, it&#039;s not the latest volume in Wiley&#039;s book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-06T20:25:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-15T09:49:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png\",\"width\":400,\"height\":260,\"caption\":\"OSX Dummy Mac Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/\",\"name\":\"New Mac malware targets cryptocoin 'dummies' - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#primaryimage\"},\"datePublished\":\"2018-07-06T20:25:53+00:00\",\"dateModified\":\"2019-06-15T09:49:16+00:00\",\"description\":\"Mac malware for dummies?\\u00a0No, it's not the latest volume in Wiley's book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Mac malware targets cryptocoin &#8216;dummies&#8217;\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"New Mac malware targets cryptocoin &#8216;dummies&#8217;\",\"datePublished\":\"2018-07-06T20:25:53+00:00\",\"dateModified\":\"2019-06-15T09:49:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#webpage\"},\"wordCount\":633,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png\",\"keywords\":[\"Mac\",\"Malware\",\"OSX\/Dummy\",\"Social Engineering\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Mac malware for dummies?\u00a0No, it's not the latest volume in Wiley's book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/","og_locale":"en_US","og_type":"article","og_title":"New Mac malware targets cryptocoin 'dummies' - The Mac Security Blog","og_description":"Mac malware for dummies?\u00a0No, it's not the latest volume in Wiley's book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-07-06T20:25:53+00:00","article_modified_time":"2019-06-15T09:49:16+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png","width":400,"height":260,"caption":"OSX Dummy Mac Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/","name":"New Mac malware targets cryptocoin 'dummies' - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#primaryimage"},"datePublished":"2018-07-06T20:25:53+00:00","dateModified":"2019-06-15T09:49:16+00:00","description":"Mac malware for dummies?\u00a0No, it's not the latest volume in Wiley's book series. OSX\/Dummy is new Mac malware that rudely refers to its victims as dummies","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Mac malware targets cryptocoin &#8216;dummies&#8217;"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"New Mac malware targets cryptocoin &#8216;dummies&#8217;","datePublished":"2018-07-06T20:25:53+00:00","dateModified":"2019-06-15T09:49:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#webpage"},"wordCount":633,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png","keywords":["Mac","Malware","OSX\/Dummy","Social Engineering"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-targets-cryptocoin-dummies\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/OSX-Dummy-Mac-Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kYF","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80641"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=80641"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80641\/revisions"}],"predecessor-version":[{"id":88201,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/80641\/revisions\/88201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80692"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=80641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=80641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=80641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}