	{"id":84208,"date":"2018-11-14T11:32:03","date_gmt":"2018-11-14T19:32:03","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=84208"},"modified":"2019-05-08T20:47:49","modified_gmt":"2019-05-09T03:47:49","slug":"ad-injecting-mac-malware-rediscovered","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/","title":{"rendered":"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome"},"content":{"rendered":"<p>Most people assume that there&#8217;s little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking.<\/p>\n<p>Malware analysts\u2014even those focused on Mac malware\u2014process so many malware samples that not every new piece of malware necessarily gets its own dedicated article or press release.<\/p>\n<p>Such was the case with <strong>OSX\/SearchPageInjector<\/strong>, Mac malware that Intego has been detecting since January 2018. OSX\/SearchPageInjector recently came back on our radar after Thomas Reed wrote up a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-malware-intercepts-encrypted-web-traffic-for-ad-injection\/\" target=\"_blank\" rel=\"noopener\">piece<\/a> about it under the name OSX.SearchAwesome.<\/p>\n<p>Since it has been in the news recently, let&#8217;s take a look at what this malware does and how to avoid it.<\/p>\n<h3>What Is OSX\/SearchPageInjector?<\/h3>\n<p><strong>OSX\/SearchPageInjector<\/strong> is Mac malware designed to inject remotely hosted JavaScript code into every Web page the victim visits.<\/p>\n<p>The JavaScript code has been observed to inject advertisements, but it could also potentially be used for cryptojacking\u2014i.e. hijacking the Mac&#8217;s processing power to mine cryptocurrency on behalf of the attacker; see our <a href=\"http:\/\/podcast.intego.com\/33\" target=\"_blank\" rel=\"noopener\">audio podcast<\/a> and our\u00a0<a href=\"https:\/\/youtu.be\/3DW_MaoCmGU\" target=\"_blank\" rel=\"noopener\">YouTube video<\/a> on cryptojacking\u2014or more sinister purposes such as stealing usernames and passwords.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/3DW_MaoCmGU?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>OSX\/SearchPageInjector makes use of open-source man-in-the-middle proxy software to inject the attacker&#8217;s JavaScript code into all Web sites\u2014even those delivered over HTTPS, the more secure HTTP alternative that&#8217;s used by most popular Web sites.<\/p>\n<h3>How Do Macs Get Infected With OSX\/SearchPageInjector?<\/h3>\n<p>This malware comes as a second-stage infection after a user downloads a supposedly &#8220;cracked&#8221; version of an app from a torrent.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-65881\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results.png\" alt=\"\" width=\"600\" height=\"328\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results-150x82.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Torrents-Scan-Results-300x164.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>Apps downloaded from <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\" target=\"_blank\" rel=\"noopener\">torrents<\/a>\u00a0often contain malware.<\/p>\n<p>Thus, to avoid this particular infection, users simply need to avoid the temptation to download illegal copies of software.<\/p>\n<h3>How Can I Clean an Infected Mac?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier<\/a> has been detecting and eradicating OSX\/SearchPageInjector since January 2018.<\/p>\n<p>If the malware has been removed from your computer and you know you don&#8217;t use the open-source\u00a0software\u00a0<a href=\"https:\/\/mitmproxy.org\/\">mitmproxy<\/a>, then you&#8217;ll also want to open the Keychain Access app (found in the \/Applications\/Utilities folder) and search for and delete the root certificate authority named mitmproxy.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-84223\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/mitmproxy-Root-Certificate-Authority-CA-in-Keychain-Access-app-2.png\" alt=\"\" width=\"877\" height=\"555\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/mitmproxy-Root-Certificate-Authority-CA-in-Keychain-Access-app-2.png 877w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/mitmproxy-Root-Certificate-Authority-CA-in-Keychain-Access-app-2-150x95.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/mitmproxy-Root-Certificate-Authority-CA-in-Keychain-Access-app-2-300x190.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/mitmproxy-Root-Certificate-Authority-CA-in-Keychain-Access-app-2-768x486.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/mitmproxy-Root-Certificate-Authority-CA-in-Keychain-Access-app-2-657x416.png 657w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/>If you didn&#8217;t install mitmproxy, delete its root CA in Keychain Access. Screenshot: <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-malware-intercepts-encrypted-web-traffic-for-ad-injection\/\" target=\"_blank\" rel=\"noopener\">Reed<\/a><\/p>\n<h3>Where Can I Learn More?<\/h3>\n<p>We briefly discussed OSX\/SearchPageInjector on the <a href=\"http:\/\/podcast.intego.com\/55\" target=\"_blank\" rel=\"noopener\">November 2 edition<\/a> of the Intego Mac Podcast; be sure to <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to make sure you don&#8217;t miss future episodes!<\/p>\n<p>For\u00a0additional technical details about OSX\/SearchPageInjector, you can\u00a0refer to\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-malware-intercepts-encrypted-web-traffic-for-ad-injection\/\" target=\"_blank\" rel=\"noopener\">Reed&#8217;s write-up<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people assume that there&#8217;s little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware analysts\u2014even those focused on Mac malware\u2014process so many malware samples that not every new piece of malware necessarily gets its own dedicated article or press release. Such was the case with OSX\/SearchPageInjector, [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":84232,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,4399],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Most people assume that there&#039;s little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Most people assume that there&#039;s little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-14T19:32:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-09T03:47:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png\",\"width\":400,\"height\":260,\"caption\":\"Ad Injecting Mac Malware Rediscovered\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/\",\"name\":\"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#primaryimage\"},\"datePublished\":\"2018-11-14T19:32:03+00:00\",\"dateModified\":\"2019-05-09T03:47:49+00:00\",\"description\":\"Most people assume that there's little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome\",\"datePublished\":\"2018-11-14T19:32:03+00:00\",\"dateModified\":\"2019-05-09T03:47:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#webpage\"},\"wordCount\":414,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png\",\"keywords\":[\"Malware\",\"OSX\/SearchPageInjector\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Most people assume that there's little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/","og_locale":"en_US","og_type":"article","og_title":"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome - The Mac Security Blog","og_description":"Most people assume that there's little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-11-14T19:32:03+00:00","article_modified_time":"2019-05-09T03:47:49+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png","width":400,"height":260,"caption":"Ad Injecting Mac Malware Rediscovered"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/","name":"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#primaryimage"},"datePublished":"2018-11-14T19:32:03+00:00","dateModified":"2019-05-09T03:47:49+00:00","description":"Most people assume that there's little, if any, Mac malware out there in the wild. Unfortunately, that notion is merely wishful thinking. Malware","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Ad-injecting Mac malware rediscovered: SearchPageInjector\/SearchAwesome","datePublished":"2018-11-14T19:32:03+00:00","dateModified":"2019-05-09T03:47:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#webpage"},"wordCount":414,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png","keywords":["Malware","OSX\/SearchPageInjector"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ad-injecting-mac-malware-rediscovered\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Ad-Injecting-Mac-Malware-Rediscovered-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lUc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/84208"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=84208"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/84208\/revisions"}],"predecessor-version":[{"id":87541,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/84208\/revisions\/87541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/84232"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=84208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=84208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=84208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}