{"id":85531,"date":"2019-01-29T20:24:23","date_gmt":"2019-01-30T04:24:23","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=85531"},"modified":"2021-10-07T19:13:51","modified_gmt":"2021-10-08T02:13:51","slug":"verymal-mac-attack-hides-data-within-a-picture","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/","title":{"rendered":"VeryMal Mac attack hides data within a picture"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52468\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>A recent malware distribution campaign dubbed &#8220;VeryMal&#8221; leverages an ancient technique called steganography\u2014the hiding of secret information in plain sight\u2014to distribute Mac malware.<\/p>\n<p>The VeryMal campaign was caught distributing <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/osxshlayer\/\" target=\"_blank\" rel=\"noopener\">OSX\/Shlayer<\/a>, which was originally discovered by Intego researchers one year ago.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-75805\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-1024x572.jpg\" alt=\"\" width=\"1024\" height=\"572\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-1024x572.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-300x168.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-768x429.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome-657x367.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Shlayer_A_download_step_2_Chrome.jpg 1392w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\">OSX\/Shlayer malware still masquerades as a fake Flash Player.<\/p>\n<h3>What makes this malware campaign unique?<\/h3>\n<p>Although the concept of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steganography\" target=\"_blank\" rel=\"noopener\">steganography<\/a> has been around for hundreds of years, it is not something we see in a lot of Mac malware campaigns.<\/p>\n<p>The VeryMal campaign used some cleverly crafted JavaScript code to look for secret information stored within a seemingly innocuous JPEG image file. The hidden data tells the site where to go to find the malware.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-85534\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/sscc_jpg-steganographic-image-screenshot-via-blog_confiant_com-cropped.png\" alt=\"\" width=\"528\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/sscc_jpg-steganographic-image-screenshot-via-blog_confiant_com-cropped.png 528w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/sscc_jpg-steganographic-image-screenshot-via-blog_confiant_com-cropped-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/sscc_jpg-steganographic-image-screenshot-via-blog_confiant_com-cropped-300x111.png 300w\" sizes=\"(max-width: 528px) 100vw, 528px\" \/><\/p>\n<p style=\"text-align: center;\">To the naked eye, the image looks like a plain, white rectangle. Credit: <a href=\"https:\/\/blog.confiant.com\/confiant-malwarebytes-uncover-steganography-based-ad-payload-that-drops-shlayer-trojan-on-mac-cd31e885c202\" target=\"_blank\" rel=\"noopener\">Stein<\/a><\/p>\n<p>Why go to all this trouble? In theory, using steganography or other <a href=\"https:\/\/en.wikipedia.org\/wiki\/Obfuscation_(software)\" target=\"_blank\" rel=\"noopener\">obfuscation<\/a> techniques makes it more difficult for endpoint protection and network monitoring software to determine that something suspicious might be happening.<\/p>\n<p>In practice, however, this tricky tactic does not prevent well-designed antivirus software like VirusBarrier X9 from keeping users safe.<\/p>\n<h3>Is my Mac infected?<\/h3>\n<p>Users of Intego VirusBarrier X9 (part of Intego&#8217;s\u00a0<a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener\">Mac Premium Bundle X9<\/a>\u00a0suite) or\u00a0<a href=\"https:\/\/www.intego.com\/business\/flextivity-secure\" target=\"_blank\" rel=\"noopener\">Flextivity<\/a>\u00a0<strong>were already protected<\/strong> from this threat before the discovery of the VeryMal campaign.<\/p>\n<p><strong>If you aren&#8217;t a VirusBarrier X9 user<\/strong> and you think you might have downloaded a fake Flash Player, you can scan your Mac with <a href=\"https:\/\/www.intego.com\/virusbarrier-scanner\" target=\"_blank\" rel=\"noopener\">VirusBarrier Scanner<\/a> (available for <a href=\"https:\/\/itunes.apple.com\/us\/app\/virusbarrier-scanner\/id1200445649\" target=\"_blank\" rel=\"noopener\">free<\/a> on the Mac App Store) to check for any infections. After you scan your Mac, your best bet to <strong>prevent future infections<\/strong> is to <a href=\"https:\/\/www.intego.com\/buynow\" target=\"_blank\" rel=\"noopener\">get VirusBarrier X9<\/a>, which includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener\">real-time scanning<\/a> functionality\u2014a critical feature to block malware before it can harm your Mac.<\/p>\n<h3>How sysadmins can find potentially infected Macs<\/h3>\n<p>If you&#8217;re a systems administrator and want to check for potentially infected Macs on your network, you can check whether any Macs phoned home to one of the following sites (remove the space before each .com):<\/p>\n<pre>veryield-malyst .com\r\ns.ad-pixel .com\/sscc.jpg<\/pre>\n<p>Any Mac that made contact with those sites around mid-January 2019 may be infected with Shlayer malware.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more technical details about the malware, you can read Eliya Stein&#8217;s <a href=\"https:\/\/blog.confiant.com\/confiant-malwarebytes-uncover-steganography-based-ad-payload-that-drops-shlayer-trojan-on-mac-cd31e885c202\" target=\"_blank\" rel=\"noopener\">write-up<\/a>.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>Each week, we talk about the latest Apple security news on the <strong>Intego Mac Podcast<\/strong>, so be sure to <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a> to make sure you don&#8217;t miss any episodes. You&#8217;ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for updates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent malware distribution campaign dubbed &#8220;VeryMal&#8221; leverages an ancient technique called steganography\u2014the hiding of secret information in plain sight\u2014to distribute Mac malware. The VeryMal campaign was caught distributing OSX\/Shlayer, which was originally discovered by Intego researchers one year ago. OSX\/Shlayer malware still masquerades as a fake Flash Player. What makes this malware campaign unique? [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":52474,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[3928],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A recent malware distribution campaign dubbed &quot;VeryMal&quot; leverages an ancient technique called steganography\u2014the hiding of secret information in plain\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VeryMal Mac attack hides data within a picture - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A recent malware distribution campaign dubbed &quot;VeryMal&quot; leverages an ancient technique called steganography\u2014the hiding of secret information in plain\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-30T04:24:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-08T02:13:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/\",\"name\":\"VeryMal Mac attack hides data within a picture - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#primaryimage\"},\"datePublished\":\"2019-01-30T04:24:23+00:00\",\"dateModified\":\"2021-10-08T02:13:51+00:00\",\"description\":\"A recent malware distribution campaign dubbed \\\"VeryMal\\\" leverages an ancient technique called steganography\\u2014the hiding of secret information in plain\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VeryMal Mac attack hides data within a picture\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"VeryMal Mac attack hides data within a picture\",\"datePublished\":\"2019-01-30T04:24:23+00:00\",\"dateModified\":\"2021-10-08T02:13:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#webpage\"},\"wordCount\":424,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"keywords\":[\"OSX\/Shlayer\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A recent malware distribution campaign dubbed \"VeryMal\" leverages an ancient technique called steganography\u2014the hiding of secret information in plain","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/","og_locale":"en_US","og_type":"article","og_title":"VeryMal Mac attack hides data within a picture - The Mac Security Blog","og_description":"A recent malware distribution campaign dubbed \"VeryMal\" leverages an ancient technique called steganography\u2014the hiding of secret information in plain","og_url":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-01-30T04:24:23+00:00","article_modified_time":"2021-10-08T02:13:51+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","width":400,"height":260,"caption":"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/","name":"VeryMal Mac attack hides data within a picture - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#primaryimage"},"datePublished":"2019-01-30T04:24:23+00:00","dateModified":"2021-10-08T02:13:51+00:00","description":"A recent malware distribution campaign dubbed \"VeryMal\" leverages an ancient technique called steganography\u2014the hiding of secret information in plain","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"VeryMal Mac attack hides data within a picture"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"VeryMal Mac attack hides data within a picture","datePublished":"2019-01-30T04:24:23+00:00","dateModified":"2021-10-08T02:13:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#webpage"},"wordCount":424,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","keywords":["OSX\/Shlayer"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-mfx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85531"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=85531"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85531\/revisions"}],"predecessor-version":[{"id":94702,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/85531\/revisions\/94702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52474"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=85531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=85531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=85531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}