{"id":88456,"date":"2019-06-24T07:10:15","date_gmt":"2019-06-24T14:10:15","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=88456"},"modified":"2023-03-13T21:03:14","modified_gmt":"2023-03-14T04:03:14","slug":"mac-malware-on-the-rise-again-several-new-threats-found","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/","title":{"rendered":"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-51292 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/imac-malware-660x370.jpeg\" alt=\"\" width=\"660\" height=\"370\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/imac-malware-660x370.jpeg 660w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/imac-malware-660x370-150x84.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/imac-malware-660x370-300x168.jpeg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/imac-malware-660x370-657x368.jpeg 657w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Mac malware continues to increase in both quantity and variety. In addition to Intego&#8217;s discovery of new\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass\/\" target=\"_blank\" rel=\"noopener\">OSX\/Linker<\/a>\u00a0and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\" target=\"_blank\" rel=\"noopener\">OSX\/CrescentCore<\/a> Mac malware, several other active malware campaigns have been observed in June 2019, everything from a bizarre cryptocurrency miner to creepy backdoors that could allow an attacker to log your keystrokes, and more. Let&#8217;s take a look at some of the Mac malware we&#8217;ve seen in the wild in recent weeks.<\/p>\n<p>In this article:<\/p>\n<ul>\n<li><a href=\"#netwire-mokes\">Firefox zero-day leveraged to spread OSX\/Netwire and OSX\/Mokes<\/a><\/li>\n<li><a href=\"#loudminer\">LoudMiner aka Bird Miner found in &#8220;cracked&#8221; VST installers<\/a><\/li>\n<li><a href=\"#newtab\">Intego discovers OSX\/NewTab<\/a><\/li>\n<li><a href=\"#how-to-remove\">How can one remove or prevent this and other Mac malware?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"netwire-mokes\"><\/a><\/li>\n<\/ul>\n<h3>Firefox zero-day leveraged to spread OSX\/Netwire and OSX\/Mokes<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-88465\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-150x150.png\" alt=\"\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Mozilla-Firefox-Quantum-logo-high-res.png 378w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>A zero-day vulnerability in Firefox (<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2019-18\/\" target=\"_blank\" rel=\"noopener\">CVE-2019-11707<\/a>) was leveraged by attackers to spread multiple types of Mac malware.<\/p>\n<p>One of the malware families that spread through exploitation of this vulnerability was <strong>OSX\/Netwire<\/strong>, a successor to\u00a0<strong>OSX\/NetWeirdRC<\/strong> which Intego wrote about in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/an-analysis-of-the-cross-platform-backdoor-netweirdrc\/\" target=\"_blank\" rel=\"noopener\">2012<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-updates-xprotect-malware-definitions-for-netweirdrc\/\" target=\"_blank\" rel=\"noopener\">2016<\/a>.\u00a0 The other malware family is identified as\u00a0<strong>OSX\/Mokes<\/strong>, which Intego also wrote about in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">2016<\/a>. Both are &#8220;backdoor&#8221; malware, meaning that they have capabilities such as logging keystrokes and taking screenshots of an infected Mac, allowing an attacker to spy on their victims.<\/p>\n<p>It&#8217;s worth noting that although the rudimentary XProtect malware detection system built into macOS was theoretically capable of detecting the <strong>OSX\/Netwire<\/strong> sample, in fact XProtect provided no protection whatsoever in this case. Malware installed via a vulnerability doesn&#8217;t get tagged with a &#8220;quarantine&#8221; flag, which means it isn&#8217;t on XProtect&#8217;s radar, which in turn means that the built-in malware defense in macOS is essentially worthless in such circumstances.<\/p>\n<p>Full technical write-ups on these backdoors can be found in a series of articles by Patrick Wardle: <strong>Burned by Fire(fox)<\/strong> <a href=\"https:\/\/objective-see.com\/blog\/blog_0x43.html\" target=\"_blank\" rel=\"nofollow noopener\">part 1<\/a>\u00a0and\u00a0<a href=\"https:\/\/objective-see.com\/blog\/blog_0x44.html\" target=\"_blank\" rel=\"nofollow noopener\">part 2<\/a>\u00a0(about <strong>OSX\/Netwire<\/strong>), and <a href=\"https:\/\/objective-see.com\/blog\/blog_0x45.html\" target=\"_blank\" rel=\"nofollow noopener\">part 3<\/a> (about <strong>OSX\/Mokes<\/strong>).<\/p>\n<p>Mac users can protect themselves from the Firefox zero-day vulnerability by ensuring they&#8217;re using the latest version of the browser. To check for updates, click on the <strong>Firefox<\/strong> menu (next to the Apple logo menu in the top-left corner of the screen) and select <strong>About Firefox<\/strong>.<a name=\"loudminer\"><\/a><\/p>\n<h3>LoudMiner aka Bird Miner found in &#8220;cracked&#8221; VST installers<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-88468\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/bird-with-megaphone-150x128.jpg\" alt=\"\" width=\"150\" height=\"128\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/bird-with-megaphone-150x128.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/bird-with-megaphone.jpg 155w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Two research teams independently discovered a strange cryptocurrency miner that was being distributed in pirated (&#8220;cracked&#8221;) copies of VST audio software, which appear to have been distributed through a blog site for several months\u2014perhaps as early as August or September 2018 based on Intego&#8217;s research.<\/p>\n<p>The pirated software comes with a parasite: cryptocurrency mining software that attempts to use your Mac&#8217;s processing power to make money for the digital pirates.<\/p>\n<p>What&#8217;s particularly bizarre about this unwanted miner is that, rather than the mining software app running as a simple background process, the miner runs within an entire Linux operating system inside of a Qemu virtual machine. In other words, while you&#8217;re running macOS, another operating system boots up inside of macOS and starts running cryptomining software. It&#8217;s unclear whether the pirates were just lazy and trying to come up with a cross-platform solution that took little effort, or whether they were trying to use this technique to hide from antivirus software that might detect the miner if it were running natively on the infected computer.<\/p>\n<p>Intego detects this threat as <strong>OSX\/LoudMiner<\/strong>. Full technical write-ups about this malware campaign were written by <a href=\"https:\/\/www.welivesecurity.com\/2019\/06\/20\/loudminer-mining-cracked-vst-software\/\" target=\"_blank\" rel=\"nofollow noopener\">Michal Malik<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/mac\/2019\/06\/new-mac-cryptominer-malwarebytes-detects-as-bird-miner-runs-by-emulating-linux\/\" target=\"_blank\" rel=\"nofollow noopener\">Thomas Reed<\/a>.<a name=\"newtab\"><\/a><\/p>\n<h3>Intego discovers OSX\/NewTab<\/h3>\n<p>Intego has also added detection for <strong>OSX\/NewTab<\/strong>, malware that attempts to inject tabs into the Safari browser. The oldest known samples date back to April 21. Some of the file names are clear indicators of deception, including <code>Government Forms Online Installer.app.zip<\/code> and <code>Quick N Easy Recipes Installer.app.zip<\/code>. All samples have an identifier of <a href=\"https:\/\/www.virustotal.com\/gui\/search\/signature%253A%2522com.NTAppStubInstaller%2522\/files\" target=\"_blank\" rel=\"noopener\">com.NTAppStubInstaller<\/a> and were digitally signed with the Apple Developer ID\u00a0<a href=\"https:\/\/www.virustotal.com\/gui\/search\/signature%253AHYC4353YBE\/files\" target=\"_blank\" rel=\"noopener\">cosmina beteringhe (HYC4353YBE)<\/a>. (A VirusTotal account is required to access these links.)<\/p>\n<p>Related SHA-256 hashes for this malware include:<\/p>\n<pre>55da84cbe3131aa67a50a8a286e24aeb6f8fbeb765e72f6b01ef474e57e33282\r\nb3ef491a1ad3bd5e1bce13324af3d752afde8cbd33582fe757d7242c00216c66\r\n0e020581f1949efa19210c952c733fb6786f500d79018a9249fbbbde8ea5eb2a\r\n0e407472a382baaefbf59727f23e2fc232a816a27e552c94fd2a87e047f1ae81\r\n20c0a448b047a277364700ed30199da215cbf607b18f647fbf2b54ede8328f56\r\n315a3d80658282d60d300f63143762fd6f224d54e4147ef2e54f3e7e01a26f92\r\n444a00c67c9e64ff52dcb6945e0c52e30ca7d2661ba1f712ac15ebe0e5439261\r\n581bc362dc2409a786bdf44d5c44726ffd2506ead80a5da85463ccb214262f02\r\n75246e4ed536d6a34f3fa55f5ed3d5db57bb751c5bdf6d62e018fcfee5358e73\r\n8133e9c221b6dca42a08eed96b447155df45669edec53b8424ea1bedbe502829\r\n9633f16680bdbcfc55148ec49e8cc5e21839411ef23dfce022d356af9dd4b6df\r\n9ca3d6014d4691dd059acd56fde6a5f253ca0a90d4b4233f8b40f702cdc18671\r\nb6b44064eaa032d1b17ab6e3321d7193cd7d59e029a642c7bc22799e46d71ead\r\nbe2fe75df4679639fd42e01c2cfb8bfb4a3fbb496453d59bdcc3c8fd04161fcd\r\nc59fe3a145e3177ef9aab4095fea66e663827611cf3c6fd851da781458f7e637\r\nc7a58b136937b89287e8abca9ef589909d7dc3f51dd0f94547a5266473c8ee0c\r\ndf6d98870aca6607bc9aee774efbdb9e84834a9f718e03cc5d2dba21375b9f91\r\ne06cead4d754b0e990c5024d28d43500ddb241e79065ffb9b8a695f94c97d6a5<\/pre>\n<p>These additional VirusTotal searches can show more related samples: <a href=\"https:\/\/www.virustotal.com\/gui\/search\/similar-to%253A55da84cbe3131aa67a50a8a286e24aeb6f8fbeb765e72f6b01ef474e57e33282\/files\" target=\"_blank\" rel=\"noopener\">Mach-O binaries<\/a>, <a href=\"https:\/\/www.virustotal.com\/gui\/search\/similar-to%253A75246e4ed536d6a34f3fa55f5ed3d5db57bb751c5bdf6d62e018fcfee5358e73\/files\" target=\"_blank\" rel=\"noopener\">zip files 1<\/a>, <a href=\"https:\/\/www.virustotal.com\/gui\/search\/similar-to%253A0e020581f1949efa19210c952c733fb6786f500d79018a9249fbbbde8ea5eb2a\/files\" target=\"_blank\" rel=\"noopener\">zip files 2<\/a>.<\/p>\n<p>Notably, none of the approximately 60 antivirus engines on VirusTotal is currently detecting this malware. Intego seems to be the first to add detection for this malware family.<\/p>\n<p><strong>Related:<\/strong> Intego discovered two other new Mac malware varieties and published about them this week:<a name=\"how-to-remove\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"B7tAKO0zZZ\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass\/\">OSX\/Linker: New Mac malware attempts zero-day Gatekeeper bypass<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;OSX\/Linker: New Mac malware attempts zero-day Gatekeeper bypass&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass\/embed\/#?secret=B7tAKO0zZZ\" data-secret=\"B7tAKO0zZZ\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"EZIyHAQ4V8\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\">OSX\/CrescentCore: Mac malware designed to evade antivirus<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;OSX\/CrescentCore: Mac malware designed to evade antivirus&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/embed\/#?secret=EZIyHAQ4V8\" data-secret=\"EZIyHAQ4V8\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can one remove or prevent this and other Mac malware?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/p>\n<p>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate all of these Mac malware families.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on a wide range of Mac hardware and operating systems, including the very latest Macs.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from PC malware.<\/p>\n<p><span style=\"font-size: small;\">Note: Intego customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected from this threat. It is best to upgrade to the latest versions of VirusBarrier and macOS, if possible, to ensure your Mac gets all the latest security updates from Apple<\/span><span style=\"font-size: small;\">.<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We talked about some of this malware on <a href=\"https:\/\/podcast.intego.com\/88\" target=\"_blank\" rel=\"noopener\">episode 88<\/a> of the <strong>Intego Mac Podcast<\/strong>.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+x0s6Yklw?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac malware continues to increase in both quantity and variety. In addition to Intego&#8217;s discovery of new\u00a0OSX\/Linker\u00a0and OSX\/CrescentCore Mac malware, several other active malware campaigns have been observed in June 2019, everything from a bizarre cryptocurrency miner to creepy backdoors that could allow an attacker to log your keystrokes, and more. Let&#8217;s take a look [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":8763,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,2764,3121,3109],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Mac malware continues to increase in both quantity and variety. In addition to Intego&#039;s discovery of new\u00a0OSX\/Linker\u00a0and OSX\/CrescentCore Mac malware,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Mac malware continues to increase in both quantity and variety. In addition to Intego&#039;s discovery of new\u00a0OSX\/Linker\u00a0and OSX\/CrescentCore Mac malware,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-24T14:10:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T04:03:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/\",\"name\":\"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#primaryimage\"},\"datePublished\":\"2019-06-24T14:10:15+00:00\",\"dateModified\":\"2023-03-14T04:03:14+00:00\",\"description\":\"Mac malware continues to increase in both quantity and variety. In addition to Intego's discovery of new\\u00a0OSX\/Linker\\u00a0and OSX\/CrescentCore Mac malware,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab\",\"datePublished\":\"2019-06-24T14:10:15+00:00\",\"dateModified\":\"2023-03-14T04:03:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#webpage\"},\"wordCount\":988,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Malware\",\"NetWeirdRC\",\"OSX.Netwire.A\",\"OSX\/Mokes\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Mac malware continues to increase in both quantity and variety. In addition to Intego's discovery of new\u00a0OSX\/Linker\u00a0and OSX\/CrescentCore Mac malware,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/","og_locale":"en_US","og_type":"article","og_title":"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab - The Mac Security Blog","og_description":"Mac malware continues to increase in both quantity and variety. In addition to Intego's discovery of new\u00a0OSX\/Linker\u00a0and OSX\/CrescentCore Mac malware,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-06-24T14:10:15+00:00","article_modified_time":"2023-03-14T04:03:14+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/","name":"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#primaryimage"},"datePublished":"2019-06-24T14:10:15+00:00","dateModified":"2023-03-14T04:03:14+00:00","description":"Mac malware continues to increase in both quantity and variety. In addition to Intego's discovery of new\u00a0OSX\/Linker\u00a0and OSX\/CrescentCore Mac malware,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Mac malware on the rise again; several new threats found: Netwire, Mokes, LoudMiner, NewTab","datePublished":"2019-06-24T14:10:15+00:00","dateModified":"2023-03-14T04:03:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#webpage"},"wordCount":988,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Malware","NetWeirdRC","OSX.Netwire.A","OSX\/Mokes"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-n0I","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88456"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=88456"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88456\/revisions"}],"predecessor-version":[{"id":97410,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88456\/revisions\/97410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=88456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=88456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=88456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}