{"id":82069,"date":"2018-08-27T13:54:32","date_gmt":"2018-08-27T20:54:32","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=82069"},"modified":"2018-09-10T22:12:04","modified_gmt":"2018-09-11T05:12:04","slug":"operation-applejeus-and-osxlazarus-rise-of-a-mac-apt","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/","title":{"rendered":"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/lazarus-mac-malware\/\" rel=\"attachment wp-att-82108\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-82108\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Lazarus-Mac-Malware.png\" alt=\"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Lazarus-Mac-Malware.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Lazarus-Mac-Malware-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Lazarus-Mac-Malware-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware, produced by a threat actor known as the Lazarus Group, has breathed new life into an infrequently discussed topic in Mac security: advanced persistent threats (APT).<\/p>\n<h3>What Is an APT?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-82075\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Business-Data-Security-Threats-APT-300x205.jpg\" alt=\"\" width=\"300\" height=\"205\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Business-Data-Security-Threats-APT-300x205.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Business-Data-Security-Threats-APT-150x102.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Business-Data-Security-Threats-APT.jpg 539w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Advanced persistent threats (APTs) usually involve malware that is designed by nation-state caliber threat actors, engineered to evade anti-virus protection, and usually targeted at a particular organization or individual. APTs often leverage <a href=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" target=\"_blank\">zero-day vulnerabilities<\/a> in systems known to be used by an intended target.<\/p>\n<h3>Who Is the Lazarus Group?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-82081\" title=\"Flag of North Korea\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Flag-of-North-Korea-150x108.png\" alt=\"\" width=\"150\" height=\"108\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Flag-of-North-Korea-150x108.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Flag-of-North-Korea-300x217.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Flag-of-North-Korea.png 454w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>The Lazarus Group is believed to have ties to North Korea for a variety of reasons, having been linked to attacks on the government of South Korea as far back as 2009. Other attacks attributed to the Lazarus Group have included the Sony Pictures breach in 2014 and a variety of attacks on banks and cryptocurrency exchanges in recent years.<\/p>\n<p>In an analysis of the Windows version of the recently discovered Lazarus malware (also known as &#8220;Fallchill&#8221;), system language codes were found that hint that the malware was created on a system that prefers only Korean dialects. This discovery alone is not conclusive evidence of ties to North Korea, but malware analysts say that the language code is not something they have seen in the past, and could therefore indicate a slip-up by the developer.<\/p>\n<div id=\"attachment_82084\" style=\"width: 644px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82084\" loading=\"lazy\" class=\"size-full wp-image-82084\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Accept-Language-ko-kp.png\" alt=\"\" width=\"634\" height=\"131\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Accept-Language-ko-kp.png 634w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Accept-Language-ko-kp-150x31.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Accept-Language-ko-kp-300x62.png 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><p id=\"caption-attachment-82084\" class=\"wp-caption-text\">The Windows variant has an string that hints at North Korea ties. Image: <a href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" target=\"_blank\">Securelist<\/a><\/p><\/div>\n<p>Definitively attributing an APT to a threat actor can be challenging, because there is always the possibility that a sophisticated developer has planted &#8220;false flags&#8221; to mislead researchers, or has borrowed code or techniques from another threat actor to throw researchers off their scent. In this case, however, there is an abundance of evidence linking the recent malware to previous Fallchill malware that has been attributed to the Lazarus Group, including the reuse of command-and-control server IP addresses and\u00a0the same\u00a0hard-coded encryption key baked into the malware&#8217;s code.<\/p>\n<h3>What Is Known About OSX\/Lazarus?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-31660\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-139x150.jpeg\" alt=\"\" width=\"139\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-139x150.jpeg 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-278x300.jpeg 278w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350.jpeg 325w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/>The recently discovered malware campaign (codename &#8220;jeus,&#8221; also known as &#8220;Operation AppleJeus&#8221;) appears to have launched publicly in late April 2018, as a Trojan horse under the guise of a cryptocurrency trading application going by the name &#8220;Celas Trade Pro&#8221; by the company &#8220;Celas Limited&#8221; (or Celas LLC). Windows and Mac versions of the software installer were available to download through the company&#8217;s site.<\/p>\n<div id=\"attachment_82087\" style=\"width: 954px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82087\" loading=\"lazy\" class=\"size-full wp-image-82087\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage.png\" alt=\"\" width=\"944\" height=\"915\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage.png 944w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage-150x145.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage-300x291.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage-768x744.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage-657x637.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Celas-LLC-homepage-32x32.png 32w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/><p id=\"caption-attachment-82087\" class=\"wp-caption-text\">The Celas Limited homepage implies that the Trojan horse was released in late April 2018. Image: <a href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" target=\"_blank\">Securelist<\/a><\/p><\/div>\n<p>Upon installation, Celas Trade Pro&#8217;s auto-update functionality would activate, acting as a malicious dropper that would install an unwanted backdoor payload on the victim&#8217;s computer. <img loading=\"lazy\" class=\"alignright size-full wp-image-82090\" title=\"Celas Trade Pro icon\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo.png\" alt=\"\" width=\"129\" height=\"129\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo.png 129w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-logo-128x128.png 128w\" sizes=\"(max-width: 129px) 100vw, 129px\" \/>The Mac version&#8217;s autoupdater is invoked by a LaunchDaemon file named &#8220;.com.celastradepro.plist&#8221; (with or without a period at the beginning, depending on the version; the preceding period makes a file or folder invisible in the Finder).<\/p>\n<p>When the malware phones home to a command-and-control server, it uses a hard-coded User Agent string that identifies itself as &#8220;Mozilla\/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/66.0.3359.139 Safari\/537.36&#8221; \u2014\u00a0in other words, it pretends to be Chrome 66 running on macOS Sierra. The specific browser version string hints that the Mac version of OSX\/Lazarus was likely developed sometime after April 26, 2018, the date this <a href=\"https:\/\/chromereleases.googleblog.com\/2018\/04\/stable-channel-update-for-desktop_26.html\" target=\"_blank\">exact Chrome version<\/a> was released, which aligns nicely with the April 29 launch date indicated on the Celas Limited homepage.<\/p>\n<p>The discovery of OSX\/Lazarus is significant because it marks the first time the Lazarus Group is known to have branched out into targeting Macs. Previously, the Lazarus Group has primarily focused on targeting the Windows platform.<\/p>\n<h3>How to Tell If Your Mac Is\u00a0Infected<\/h3>\n<p>If you know that Celas Trade Pro has never been installed on your Mac, then you&#8217;re probably safe from this particular threat. If you share a computer with others, or if you are uncertain whether the app might have been installed in the past, you can check for the presence of the following files on your Mac to identify whether it might be infected.<\/p>\n<ul>\n<li><strong>~\/Downloads\/celastradepro_mac_installer_1.00.00.dmg<\/strong> or <strong>CelasTradePro-Installer.dmg<\/strong> \u2014\u00a0The installer disk image; it may appear in download folders in other user accounts<\/li>\n<li><strong>\/Applications\/CelasTradePro.app<\/strong> (the &#8220;.app&#8221; may not be visible) \u2014\u00a0This is the main Trojan, which contains the malicious updater<\/li>\n<li><strong>\/Library\/LaunchDaemons\/.com.celastradepro.plist<\/strong> or <strong>com.celastradepro.plist<\/strong> (the former will be hidden by default in the Finder; you can view hidden files by pressing Command-Shift-period if you use mac OS Sierra 10.12 or later) \u2014\u00a0This file makes the malicious auto-updater app relaunch after every reboot<\/li>\n<li><strong>\/var\/zdiffsec<\/strong> \u2014\u00a0This is the malicious payload downloaded and installed by the Trojan updater app<\/li>\n<\/ul>\n<p>Network administrators can look for potentially infected systems by checking logs for\u00a0computers attempting to\u00a0connect to the following domain or IP addresses:<\/p>\n<ul>\n<li>celasllc[.]com<\/li>\n<li>80.82.64[.]91<\/li>\n<li>185.142.236[.]226<\/li>\n<li>185.142.239[.]173<\/li>\n<li>196.38.48[.]121<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\">Intego VirusBarrier<\/a> detects and eradicates this threat as <strong>OSX\/Lazarus<\/strong>.<\/p>\n<h3>Who Is John Broox?<\/h3>\n<p>The name &#8220;John Broox&#8221;\u00a0appears in several places associated with the new Lazarus malware, including the Get Info window of the Mac app, and the WHOIS record for the Celas LLC domain name (in both the Registrant Name and Registrant Email fields).<\/p>\n<div id=\"attachment_82096\" style=\"width: 471px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82096\" loading=\"lazy\" class=\"size-full wp-image-82096\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-app-Get-Info-window-cropped.png\" alt=\"\" width=\"461\" height=\"352\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-app-Get-Info-window-cropped.png 699w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-app-Get-Info-window-cropped-150x115.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-app-Get-Info-window-cropped-300x229.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CelasTradePro-app-Get-Info-window-cropped-657x502.png 657w\" sizes=\"(max-width: 461px) 100vw, 461px\" \/><p id=\"caption-attachment-82096\" class=\"wp-caption-text\">The malware app&#8217;s Get Info window claims that it was developed by &#8220;John Broox.&#8221;<\/p><\/div>\n<p>Interestingly, we also discovered that\u00a0an EXE file from the\u00a0Windows\u00a0variant of the malware was <a href=\"https:\/\/www.virustotal.com\/#\/file\/a6a16551da361772c98a75665ebe3ba6339fbb5faa98f448197e10bfc080f17c\/community\" target=\"_blank\">uploaded<\/a> to the multi-engine VirusTotal scanning site on June 13, 2018, just three hours after the app had been compiled. Within minutes, the file was marked as &#8220;Safe&#8221; by two community members:\u00a0<a href=\"https:\/\/www.virustotal.com\/#\/user\/johnbroox200\/comments\" target=\"_blank\">johnbroox200<\/a> (which matches the username portion of the WHOIS e-mail address) and <a href=\"https:\/\/www.virustotal.com\/#\/user\/waliydarwish222\/comments\" target=\"_blank\">waliydarwish222<\/a>. Evidently,\u00a0someone\u00a0involved with the creation of the malware was testing to see whether it would be flagged by any\u00a0popular anti-virus engines before releasing the malware to the public, and they tried to increase the file&#8217;s credibility by adding positive reviews.<\/p>\n<p>Is John Broox a real name? No, it almost certainly is not. According to various name information sites, the surname Broox with that spelling is extremely uncommon;\u00a0only a handful of people worldwide are believed to have it.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-82099\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Waliy-Darwish-LinkedIn-300x258.png\" alt=\"\" width=\"200\" height=\"172\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Waliy-Darwish-LinkedIn-300x258.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Waliy-Darwish-LinkedIn-150x129.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Waliy-Darwish-LinkedIn.png 572w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>But what about the second name, Waliy Darwish? It\u00a0is unclear what Mr. Darwish&#8217;s\u00a0involvement is. He seems to have fairly legitimate-looking profiles on LinkedIn and Twitter identifying himself as &#8220;Business Developer\u00a0at CELAS LLC&#8221; since\u00a0February 2018. It\u00a0 is possible that he may have been hired to assist with the development of the legitimate\u00a0portions of the Celas Trade Pro app, before &#8220;John Broox&#8221; added the malicious components. If Darwish is a real person, it&#8217;s unclear whether he knew about the malicious component of the app.<\/p>\n<h3>What Do &#8220;Celas&#8221; and &#8220;Jeus&#8221; Mean?<\/h3>\n<p>Although it is unknown what the creators&#8217; intentions were when naming\u00a0the\u00a0app and the campaign&#8217;s code name, there are some interesting potential etymological meanings behind the words.<\/p>\n<p>&#8220;Celas,&#8221; the name of the company and the app, can be an <a href=\"https:\/\/en.wiktionary.org\/wiki\/celar#Spanish\" target=\"_blank\">Ido and Spanish word<\/a> meaning &#8220;you conceal,&#8221; with an additional Spanish meaning of &#8220;you watch over.&#8221;<\/p>\n<p>&#8220;Jeus,&#8221; the apparent code name of the malware campaign,\u00a0can\u00a0be a <a href=\"https:\/\/en.wiktionary.org\/wiki\/jeure\" target=\"_blank\">Catalan word<\/a> meaning &#8220;you lie down.&#8221;<\/p>\n<p>So perhaps the idea is that while you (the victim) lie down, you (now meaning the threat actor) conceal\u00a0malicious activity (in a Trojan horse) and watch over\u00a0the victim (via the Trojan&#8217;s backdoor payload) while\u00a0they sleep.<\/p>\n<h3>Where Can I Learn More?<\/h3>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"alignright wp-image-71419 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-Podcast-A.png 216w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>We&#8217;ll talk about OSX\/Lazarus on this week&#8217;s episode of the\u00a0<strong>Intego Mac Podcast<\/strong>.\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">Subscribe now<\/a>\u00a0to make sure you don&#8217;t miss an episode!<\/p>\n<p>If you&#8217;d like additional technical details about OSX\/Lazarus, you can read <a href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" target=\"_blank\">Securelist&#8217;s coverage<\/a>.<\/p>\n<p><span style=\"font-size: x-small;\">Apple juice\/apples image credit:\u00a0<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Apple_cider_vinegar.jpg\" target=\"_blank\">Phong Nguyen<\/a>;\u00a0modified by\u00a0Joshua Long.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware, produced by a threat actor known as the Lazarus Group, has breathed new life into an infrequently discussed topic in Mac security: advanced persistent threats (APT). What Is an APT? Advanced persistent threats (APTs) usually involve [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":82117,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[4291,4294,4288,4285,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-27T20:54:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-11T05:12:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png\",\"width\":400,\"height\":260,\"caption\":\"Operation AppleJeus and OSX\/Lazarus Mac Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/\",\"name\":\"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#primaryimage\"},\"datePublished\":\"2018-08-27T20:54:32+00:00\",\"dateModified\":\"2018-09-11T05:12:04+00:00\",\"description\":\"Security researchers have uncovered\\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\\u00a0malware,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT\",\"datePublished\":\"2018-08-27T20:54:32+00:00\",\"dateModified\":\"2018-09-11T05:12:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#webpage\"},\"wordCount\":1304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png\",\"keywords\":[\"Advanced Persistent Threats (APT)\",\"AppleJeus\",\"Lazarus Group\",\"OSX\/Lazarus\",\"Trojan Horse\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/","og_locale":"en_US","og_type":"article","og_title":"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT - The Mac Security Blog","og_description":"Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-08-27T20:54:32+00:00","article_modified_time":"2018-09-11T05:12:04+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png","width":400,"height":260,"caption":"Operation AppleJeus and OSX\/Lazarus Mac Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/","name":"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#primaryimage"},"datePublished":"2018-08-27T20:54:32+00:00","dateModified":"2018-09-11T05:12:04+00:00","description":"Security researchers have uncovered\u00a0a new strain of malware, identified by Intego VirusBarrier as OSX\/Lazarus. The discovery of Lazarus Mac\u00a0malware,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Operation AppleJeus and OSX\/Lazarus: Rise of a Mac APT","datePublished":"2018-08-27T20:54:32+00:00","dateModified":"2018-09-11T05:12:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#webpage"},"wordCount":1304,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png","keywords":["Advanced Persistent Threats (APT)","AppleJeus","Lazarus Group","OSX\/Lazarus","Trojan Horse"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/operation-applejeus-and-osxlazarus-rise-of-a-mac-apt\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/AppleJeus-Lazarus-Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-llH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82069"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=82069"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82069\/revisions"}],"predecessor-version":[{"id":82162,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82069\/revisions\/82162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/82117"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=82069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=82069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=82069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}