{"id":88513,"date":"2019-06-28T08:02:56","date_gmt":"2019-06-28T15:02:56","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=88513"},"modified":"2024-04-09T12:56:17","modified_gmt":"2024-04-09T19:56:17","slug":"osx-crescentcore-mac-malware-designed-to-evade-antivirus","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/","title":{"rendered":"OSX\/CrescentCore: Mac malware designed to evade antivirus"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-88564 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-600x400.png\" alt=\"\" width=\"600\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-600x400.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-600x400-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-600x400-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Meet <strong>OSX\/CrescentCore<\/strong>, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection.<\/p>\n<p>Hot on the heels of Intego&#8217;s discovery of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass\/\" target=\"_blank\" rel=\"noopener\">OSX\/Linker<\/a> and being the first to detect <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/\" target=\"_blank\" rel=\"noopener\">OSX\/NewTab<\/a>, the Intego team has discovered in the wild another previously unknown bit of malware that installs other unwanted software. The new malware only installs other software if you&#8217;re not running third-party endpoint protection software, and only if your operating system isn&#8217;t running inside a virtual machine.<\/p>\n<p>Intego has observed this malware in multiple places across the Web, from sketchy copyright-infringing download sites to rogue, high-ranking, non-sponsored Google search results links.<\/p>\n<p><strong>Intego customers are protected<\/strong> from <strong>OSX\/CrescentCore<\/strong> and the many other Mac malware threats discovered in June.<\/p>\n<p>Continue reading to learn more, including:<\/p>\n<ul>\n<li><a href=\"#do\">What does OSX\/CrescentCore do? What makes it unique?<\/a><\/li>\n<li><a href=\"#wild\">Is this malware in the wild? How does it spread?<\/a><\/li>\n<li><a href=\"#infected\">Is my Mac infected?<\/a><\/li>\n<li><a href=\"#learn\">What should Mac users learn from this?<\/a><\/li>\n<li><a href=\"#creator\">Who created OSX\/CrescentCore?<\/a><\/li>\n<li><a href=\"#ioc\">Indicators of compromise<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"do\"><\/a><\/li>\n<\/ul>\n<h3>What does OSX\/CrescentCore do? What makes it unique?<\/h3>\n<p><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-88399\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-150x150.png\" alt=\"\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/macOS-disk-image-dmg-iso-icon.png 1024w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>OSX\/CrescentCore<\/strong> is delivered as a Trojan horse application on a .dmg disk image, masquerading as an Adobe Flash Player installer.<\/p>\n<p>However, unlike the typical, everyday, fake Flash Player updater,\u00a0<strong>OSX\/CrescentCore<\/strong>\u00a0has some extra capabilities in an effort to make it more difficult for antivirus software to detect, and more difficult for malware analysts to examine and reverse engineer.<\/p>\n<div id=\"attachment_88561\" style=\"width: 778px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-88561\" loading=\"lazy\" class=\"wp-image-88561 size-large\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-1024x1024.png\" alt=\"\" width=\"768\" height=\"768\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-1024x1024.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-disk-image-mounted.png 1126w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><p id=\"caption-attachment-88561\" class=\"wp-caption-text\">OSX\/CrescentCore&#8217;s initial stage is a Trojan horse designed to look like a Flash installer.<\/p><\/div>\n<p>If a user opens the .dmg disk image and opens the Player app (which has a Flash Player icon), the Trojan horse will first check to see whether it is running inside a virtual machine (VM). Malware analysts often examine malware inside a VM to avoid unintentionally infecting their own computers while working with dangerous files, so malware authors sometimes implement VM detection and behave differently to make it more difficult to analyze the malware&#8217;s behavior.<\/p>\n<p>The <strong>OSX\/CrescentCore<\/strong> Trojan app also checks to see whether any popular Mac antivirus programs are installed.<\/p>\n<p>If the malware determines that it&#8217;s running within a VM environment or with anti-malware software present, it will simply exit and not proceed to do anything further.<\/p>\n<p>For Mac users without antivirus software, however, the Trojan will proceed to install a LaunchAgent\u2014a persistent infection.<\/p>\n<p>A second variant of this malware is currently under analysis. Depending on the variant, the Trojan installer may install rogue software known as &#8220;Advanced Mac Cleaner&#8221; (<strong>OSX\/AMC<\/strong>) or\u00a0install a malicious Safari browser extension.<a name=\"wild\"><\/a><\/p>\n<h3>Is this malware in the wild? How does it spread?<\/h3>\n<p>The team at Intego has observed <strong>OSX\/CrescentCore<\/strong>\u00a0in the wild being distributed via numerous sites. Mac users should beware that they may encounter it, even via seemingly innocuous sources such as Google search results.<\/p>\n<p>The new malware was first observed linked from a site purporting to share digital copies of new comic books for free\u2014one of many shady sites that flagrantly violates U.S. copyright laws.<\/p>\n<div id=\"attachment_88543\" style=\"width: 1179px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-88543\" loading=\"lazy\" class=\"size-full wp-image-88543\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector.png\" alt=\"\" width=\"1169\" height=\"1222\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector.png 1169w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector-143x150.png 143w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector-287x300.png 287w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector-768x803.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector-980x1024.png 980w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector-657x687.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-pirated-comics-infection-vector-32x32.png 32w\" sizes=\"(max-width: 1169px) 100vw, 1169px\" \/><p id=\"caption-attachment-88543\" class=\"wp-caption-text\">Digital piracy sites are often laden with malicious links that lead to malware.<\/p><\/div>\n<p>Potentially harmful download links are commonly found on digital piracy sites that claim to offer download links for cracked copies of software, popular movies, and other copyrighted content that cannot be legally obtained for free. It is quite common for links on such sites to send users to malware, scams, or both.<\/p>\n<p>A high-ranking Google search result was also observed redirecting through multiple sites, eventually leading to a page (hosted at any of a large number of domains) with flashy warnings about Adobe Flash Player supposedly needing to be updated\u2014which in reality is a malware distribution site that offers variants of either the new <strong>OSX\/CrescentCore<\/strong> malware or\u00a0<strong>OSX\/Shlayer<\/strong>, both of which are disguised as Flash Player updaters (<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" target=\"_blank\" rel=\"noopener\">Intego first discovered OSX\/Shlayer<\/a> in February 2018).<\/p>\n<div id=\"attachment_88546\" style=\"width: 2750px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-88546\" loading=\"lazy\" class=\"size-full wp-image-88546\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site.png\" alt=\"\" width=\"2740\" height=\"1914\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site.png 2740w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site-150x105.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site-300x210.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site-768x536.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site-1024x715.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-fake-Adobe-Flash-Player-distribution-site-657x459.png 657w\" sizes=\"(max-width: 2740px) 100vw, 2740px\" \/><p id=\"caption-attachment-88546\" class=\"wp-caption-text\">A fraudulent site distributing OSX\/CrescentCore, disguised as Flash Player.<\/p><\/div>\n<p>You will <em>never<\/em> see a legitimate Flash Player update that looks similar to this in your browser\u2014especially if you&#8217;re using Google Chrome, which has its own built-in version of Flash that gets updated automatically whenever the browser updates itself.<\/p>\n<p>As a general rule, nobody should be installing Flash Player in 2019\u2014not even the real, legitimate one. Nearly all sites have stopped relying on Flash, as Adobe is discontinuing it; the company plans to\u00a0<a href=\"https:\/\/theblog.adobe.com\/adobe-flash-update\/\" target=\"_blank\" rel=\"noopener\">no longer release security updates<\/a> for Flash after 2020. Of course, the majority of casual Internet users aren&#8217;t aware of these facts, and malware makers love to prey on users&#8217; lack of awareness.<\/p>\n<p>See also our article about\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\">how to tell if an Adobe Flash Player update is legitimate<\/a>.<\/p>\n<p>Regarding the aforementioned rogue Google search result link, the redirection through multiple pages is accomplished through various methods. One page in the redirection chain was caught using obfuscated JavaScript code to conceal the fact that it was a redirector script.<\/p>\n<div id=\"attachment_88555\" style=\"width: 1508px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-88555\" loading=\"lazy\" class=\"size-full wp-image-88555\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector.png\" alt=\"\" width=\"1498\" height=\"804\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector.png 1498w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector-150x81.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector-300x161.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector-768x412.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector-1024x550.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Obfuscated-JavaScript-redirector-657x353.png 657w\" sizes=\"(max-width: 1498px) 100vw, 1498px\" \/><p id=\"caption-attachment-88555\" class=\"wp-caption-text\">Obfuscated JavaScript redirect code leading to an OSX\/CrescentCore fake alert page<\/p><\/div>\n<p>The complex-looking obfuscation above uses a lot of simple substitution, so with a bit of patience one can simplify the code by hand, and voil\u00e0.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-88558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector.png\" alt=\"\" width=\"1514\" height=\"372\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector.png 1514w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector-150x37.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector-300x74.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector-768x189.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector-1024x252.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Less-Obfuscated-JavaScript-redirector-657x161.png 657w\" sizes=\"(max-width: 1514px) 100vw, 1514px\" \/><\/p>\n<p>Now that it is more human-readable, we can learn that the script essentially tells the page to load a redirection script from a remote site.<\/p>\n<p>Why such complicated JavaScript code? The developer may have been trying to hide the code from anti-malware products, or may have been attempting to mask its purpose from anyone savvy enough to view a page&#8217;s source code but lacking the skill or desire to decipher the jumbled JavaScript.<a name=\"infected\"><\/a><\/p>\n<h3>Is my Mac infected?<\/h3>\n<p>Users of Intego VirusBarrier X9 (part of Intego&#8217;s\u00a0<a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener\">Mac Premium Bundle X9<\/a> suite)\u00a0will be notified if a related file is found on their Mac; it will be detected as\u00a0<strong>OSX\/CrescentCore<\/strong>.<\/p>\n<p><strong>If you aren&#8217;t a VirusBarrier X9 user<\/strong>\u00a0yet, and if you think your Mac might be infected, you can scan your Mac with <a href=\"https:\/\/www.intego.com\/virusbarrier-scanner\" target=\"_blank\" rel=\"noopener\">VirusBarrier Scanner<\/a> (available for <a href=\"https:\/\/itunes.apple.com\/us\/app\/virusbarrier-scanner\/id1200445649\" target=\"_blank\" rel=\"noopener\">free<\/a> on the Mac App Store) to check for any infections. After you scan your Mac, your best bet to prevent future infections is to <a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\" target=\"_blank\" rel=\"noopener\">get VirusBarrier X9<\/a>, which includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener\">real-time scanning<\/a> functionality\u2014a critical feature to block malware before it can harm your Mac.<a name=\"learn\"><\/a><\/p>\n<h3>What should Mac users learn from this?<\/h3>\n<p>Mac malware developers are actively becoming more clever, attempting to make it harder to detect the malicious nature of their software. As we learned with\u00a0<strong>OSX\/Linker<\/strong>, makers of Mac malware are also\u00a0experimenting with new ways of bypassing Apple&#8217;s built-in protection mechanisms, even attempting to use zero-day vulnerabilities to do so.<\/p>\n<p>As we mentioned recently, <a href=\"https:\/\/web.archive.org\/web\/20201111202714\/https:\/\/www.itspmagazine.com\/from-the-newsroom\/sorry-its-a-myth-that-macs-are-more-secure-than-pcs\" target=\"_blank\" rel=\"noopener\">it&#8217;s sadly untrue<\/a> that Macs are somehow inherently safer than Windows PCs. Within the past month alone, there have been <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-on-the-rise-again-several-new-threats-found\/\" target=\"_blank\" rel=\"noopener\">several new Mac malware campaigns<\/a> aside from Intego&#8217;s discoveries of\u00a0<strong>OSX\/CrescentCore<\/strong>\u00a0and\u00a0<strong>OSX\/Linker<\/strong>, including\u00a0<strong>OSX\/NewTab<\/strong>\u00a0(which Intego was the first to detect), <strong>OSX\/Netwire<\/strong> and <strong>OSX\/Mokes<\/strong>\u00a0(backdoors that spread via a Firefox zero-day vulnerability), <strong>OSX\/LoudMiner<\/strong> aka <strong>OSX\/BirdMiner<\/strong> (cryptocurrency miners that try to evade detection by running inside a virtualized operating system).<\/p>\n<p>That&#8217;s just some of the malware observed in this single month; there are lots more variants discovered behind the scenes each week that don&#8217;t get their own writeup or press coverage.<\/p>\n<p>Mac malware isn&#8217;t slowing down. Mac users, therefore, would be wise to take steps to actively protect themselves from malware threats.<a name=\"creator\"><\/a><\/p>\n<h3>Who created OSX\/CrescentCore?<\/h3>\n<p>The company that created this new malware identifies itself as simply &#8220;Lights.&#8221;<\/p>\n<div id=\"attachment_88534\" style=\"width: 1826px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-88534\" loading=\"lazy\" class=\"size-full wp-image-88534\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights.png\" alt=\"\" width=\"1816\" height=\"1215\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights.png 1816w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights-300x201.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights-768x514.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights-1024x685.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Lights-657x440.png 657w\" sizes=\"(max-width: 1816px) 100vw, 1816px\" \/><p id=\"caption-attachment-88534\" class=\"wp-caption-text\">&#8220;Copyright \u00a9 2019 Lights&#8221; and &#8220;Copyright \u00a9 2019 com.lights.oblivion&#8221; are how the malware company identifies itself.<\/p><\/div>\n<p>The malware is signed using multiple Apple Developer IDs registered to someone supposedly named Sanela Lovic (which may or may not be the developer&#8217;s real name); known identifiers so far include 5UA7HW48Y7 and D4AYX8GHJS.<\/p>\n<div id=\"attachment_88537\" style=\"width: 1756px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-88537\" loading=\"lazy\" class=\"wp-image-88537 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic.png\" alt=\"\" width=\"1746\" height=\"1209\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic.png 1746w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic-150x104.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic-300x208.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic-768x532.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic-1024x709.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-Sanela-Lovic-657x455.png 657w\" sizes=\"(max-width: 1746px) 100vw, 1746px\" \/><p id=\"caption-attachment-88537\" class=\"wp-caption-text\">Sanela Lovic, a developer at Lights, uses multiple Apple Developer IDs to sign OSX\/CrescentCore malware.<\/p><\/div>\n<p>There are indications that the name or username of one of the developers may be Mehdi or mehdira.<a name=\"ioc\"><\/a><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Any code signed by a developer named Sanela Lovic, regardless of the exact identifier string, should be considered suspicious. So far, Intego has specifically observed <a href=\"https:\/\/www.virustotal.com\/gui\/search\/sigcheck%253A5UA7HW48Y7\/files\" target=\"_blank\" rel=\"noopener\">Sanela Lovic (5UA7HW48Y7)<\/a> and\u00a0<a href=\"https:\/\/www.virustotal.com\/gui\/search\/sigcheck%253AD4AYX8GHJS\/files\" target=\"_blank\" rel=\"noopener\">Sanela Lovic (D4AYX8GHJS)<\/a>\u00a0being used to sign malware found in the wild. (A VirusTotal account is required to access these links.) Both of these Developer IDs have been reported to Apple and will likely be disabled soon, so the developer will likely begin to distribute malware under new Apple Developer IDs which may or may not include the name Sanela Lovic.<\/p>\n<p>Samples observed to date have been downloaded to the user&#8217;s Downloads folder with the file name <code>Player.dmg<\/code> (note that if multiple copies are present, the name could appear as <code>Player #.dmg<\/code> or <code>Player (#).dmg<\/code> where <code>#<\/code> is a numeral such as 1 or 2). Example SHA-256 hashes for infected .dmg files:<\/p>\n<blockquote><p><code>638004ee6a45903dcbf03d03e31d2e83c6270377973a64188f0b89d4062f321e<\/code><br \/>\n<code>45eab9f25158b677877a447b052f024c44c80744bcfae59deb660c47a9cbf1ac<\/code><br \/>\n<code>b111891b698dfdafb6952b0cf89aaebde51c5c1758df316e6b843624ed2db205<\/code><br \/>\n<code>8938e48a0b0f8765a017d2e25ed5a68bd7954d220e460c5aa4b1c59763ec5a8d<\/code><\/p><\/blockquote>\n<p>An infected system may also contain folders or files with the following names:<\/p>\n<blockquote><p><code>\/Library\/com.apple.spotlight.Core<\/code><br \/>\n<code>\/Library\/Application Support\/com.apple.spotlight.Core<\/code><br \/>\n<code>\/Library\/LaunchAgents\/com.google.keystone.plist<\/code><br \/>\n<code>com.player.lights.extensions.appex<\/code><\/p><\/blockquote>\n<p>All of these\u00a0<strong>OSX\/CrescentCore<\/strong>\u00a0samples are detected and eradicated by Intego VirusBarrier.<\/p>\n<p>A variant of this malware is currently being analyzed. This article may be updated as further information becomes available.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We talked about <strong>OSX\/CrescentCore<\/strong>\u00a0on <a href=\"http:\/\/podcast.intego.com\/89\" target=\"_blank\" rel=\"noopener\">episode 89<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+JUas6tuC?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p><span style=\"font-size: x-small;\">Credit to the utilities used in screenshots:\u00a0<a href=\"https:\/\/objective-see.com\/products\/whatsyoursign.html\" target=\"_blank\" rel=\"nofollow noopener\">WhatsYourSign<\/a>\u00a0displayed Apple Developer ID signatures, and <a href=\"https:\/\/lelinhtinh.github.io\/de4js\/\" target=\"_blank\" rel=\"nofollow noopener\">de4js<\/a>\u00a0color-coded the JavaScript.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego&#8217;s discovery of OSX\/Linker and being the first to detect OSX\/NewTab, the Intego team has discovered in the wild another previously unknown bit of malware that installs other unwanted software. The new malware only installs [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":88567,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4087,4537,3928],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego&#039;s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/CrescentCore: Mac malware designed to evade antivirus - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-28T15:02:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-09T19:56:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png\",\"width\":400,\"height\":260,\"caption\":\"OSX\/CrescentCore Mac malware logo\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\",\"name\":\"OSX\/CrescentCore: Mac malware designed to evade antivirus - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#primaryimage\"},\"datePublished\":\"2019-06-28T15:02:56+00:00\",\"dateModified\":\"2024-04-09T19:56:17+00:00\",\"description\":\"Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego's\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/CrescentCore: Mac malware designed to evade antivirus\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"OSX\/CrescentCore: Mac malware designed to evade antivirus\",\"datePublished\":\"2019-06-28T15:02:56+00:00\",\"dateModified\":\"2024-04-09T19:56:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#webpage\"},\"wordCount\":1687,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png\",\"keywords\":[\"OSX\/AMC.fs\",\"OSX\/CrescentCore\",\"OSX\/Shlayer\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego's","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/CrescentCore: Mac malware designed to evade antivirus - The Mac Security Blog","og_description":"Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego's","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-06-28T15:02:56+00:00","article_modified_time":"2024-04-09T19:56:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png","width":400,"height":260,"caption":"OSX\/CrescentCore Mac malware logo"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/","name":"OSX\/CrescentCore: Mac malware designed to evade antivirus - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#primaryimage"},"datePublished":"2019-06-28T15:02:56+00:00","dateModified":"2024-04-09T19:56:17+00:00","description":"Meet OSX\/CrescentCore, the next generation of fake Flash Player malware\u2014now redesigned to evade antivirus detection. Hot on the heels of Intego's","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/CrescentCore: Mac malware designed to evade antivirus"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"OSX\/CrescentCore: Mac malware designed to evade antivirus","datePublished":"2019-06-28T15:02:56+00:00","dateModified":"2024-04-09T19:56:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#webpage"},"wordCount":1687,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png","keywords":["OSX\/AMC.fs","OSX\/CrescentCore","OSX\/Shlayer"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-n1D","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88513"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=88513"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88513\/revisions"}],"predecessor-version":[{"id":100201,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88513\/revisions\/100201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/88567"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=88513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=88513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=88513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}