{"id":91612,"date":"2020-06-15T23:59:26","date_gmt":"2020-06-16T06:59:26","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91612"},"modified":"2021-05-13T01:37:41","modified_gmt":"2021-05-13T08:37:41","slug":"new-mac-malware-reveals-google-searches-can-be-unsafe","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/","title":{"rendered":"New Mac malware reveals Google searches can be unsafe"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52468\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches.<\/p>\n<p>The new malware tricks victims into bypassing Apple&#8217;s built-in macOS security protections, and it uses sneaky tactics in an effort to evade antivirus detection.<\/p>\n<p>As of Friday, the new malware installer and its payload had a 0\/60 detection rate among all antivirus engines on VirusTotal. <a href=\"https:\/\/www.intego.com\/buynow\"><strong>Intego VirusBarrier<\/strong><\/a> is the first anti-malware solution that is known to detect and remove this malware.<\/p>\n<p>Intego identifies the new malware as unique new variants of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/osxshlayer\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>OSX\/Shlayer<\/strong><\/a> (the original variant of which was <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" target=\"_blank\" rel=\"noopener noreferrer\">first discovered by Intego in 2018<\/a>) and <strong>OSX\/Bundlore<\/strong> (with similarities to past versions of OSX\/MacOffers and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/mughthesec\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mughthesec<\/a>\/BundleMeUp\/Adload).<\/p>\n<p>In this article:<\/p>\n<ul>\n<li><a href=\"#what-does-how-unique\">What does the new malware do? How is it unique?<\/a><\/li>\n<li><a href=\"#wild-spread\">Is this malware in the wild? How does it spread?<\/a><\/li>\n<li><a href=\"#can-google-stop\">Can&#8217;t Google stop this?<\/a><\/li>\n<li><a href=\"#macos-protections-bypass\">How does the malware bypass protections built into macOS?<\/a><\/li>\n<li><a href=\"#how-to-remove\">How can the malware be removed?<\/a><\/li>\n<li><a href=\"#victims\">Are there a lot of victims of this specific malware?<\/a><\/li>\n<li><a href=\"#creators\">What is known about the creators of this malware?<\/a><\/li>\n<li><a href=\"#iocs\">Indicators of compromise<\/a><\/li>\n<li><a href=\"#learn-more\">How can I learn more?<\/a><\/li>\n<\/ul>\n<p><a name=\"what-does-how-unique\"><\/a><\/p>\n<h3>What does the new malware do? How is it unique?<\/h3>\n<p>As is commonly seen in Mac malware, this newly updated Shlayer malware is delivered as a Trojan horse application on a .dmg disk image, masquerading as an Adobe Flash Player installer.<\/p>\n<div id=\"attachment_91615\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-91615\" loading=\"lazy\" class=\"wp-image-91615 size-large\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-1024x799.png\" alt=\"OSX\/Shlayer disk image screenshot, June 2020\" width=\"1024\" height=\"799\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-1024x799.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-300x234.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-150x117.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-768x600.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-1536x1199.png 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020-657x513.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-disk-image-June-2020.png 1824w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-91615\" class=\"wp-caption-text\">Note: The &#8220;censored&#8221; appearance is how it actually appears on victims&#8217; Macs.<\/p><\/div>\n<p>After the deceptive Flash Player installer is downloaded and opened on a victim&#8217;s Mac, the disk image will mount and display instructions on how to install it. The instructions tell users to first &#8220;right-click&#8221; on flashInstaller and select Open, and then to click Open in the resulting dialog box.<\/p>\n<div id=\"attachment_91616\" style=\"width: 352px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-91616\" loading=\"lazy\" class=\"wp-image-91616 size-large\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-Get-Info-window-June-2020-584x1024.png\" alt=\"OSX\/Shlayer Get Info window screenshot, June 2020\" width=\"342\" height=\"600\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-Get-Info-window-June-2020-584x1024.png 584w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-Get-Info-window-June-2020-171x300.png 171w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-Get-Info-window-June-2020-86x150.png 86w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-Get-Info-window-June-2020-657x1152.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-Get-Info-window-June-2020.png 754w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/><p id=\"caption-attachment-91616\" class=\"wp-caption-text\">&#8220;Get Info&#8221; window for the flashInstaller file<\/p><\/div>\n<p>If a user follows the instructions, the &#8220;installer app&#8221; launches. While the installer has a Flash Player icon and looks like a normal Mac app, it&#8217;s actually a bash shell script that will briefly open and run itself in the Terminal app.<\/p>\n<div id=\"attachment_91618\" style=\"width: 1412px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-91618\" loading=\"lazy\" class=\"wp-image-91618 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020.png\" alt=\"OSX\/Shlayer code screenshot, June 2020\" width=\"1402\" height=\"434\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020.png 1402w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020-300x93.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020-1024x317.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020-150x46.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020-768x238.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-code-June-2020-657x203.png 657w\" sizes=\"(max-width: 1402px) 100vw, 1402px\" \/><p id=\"caption-attachment-91618\" class=\"wp-caption-text\">A portion of the script&#8217;s code, showing the beginning of the embedded .zip file<\/p><\/div>\n<p>As the script runs, it extracts a self-embedded, password-protected .zip archive file, which contains a traditional (though malicious) Mac .app bundle. After installing the Mac app into a hidden temporary folder, it launches the Mac app and quits the Terminal. All this takes place within a split second.<\/p>\n<p>Once the Mac app launches, it downloads a legitimate, Adobe-signed Flash Player installer, so that it can appear to be genuine\u2014but the hidden Mac app is designed to also have the capability to download any other Mac malware or adware package, at the discretion of those controlling the servers to which the hidden Mac app phones home.<\/p>\n<p>The developers&#8217; decision to hide the Mac .app within a password-protected .zip file, and to hide that within a bash shell script, is a novel idea\u2014and it is also extremely clear evidence that the developers are trying to evade detection by antivirus software.<a name=\"wild-spread\"><\/a><\/p>\n<h3>Is this malware in the wild? How does it spread?<\/h3>\n<p>While searching Google for the exact titles of YouTube videos, Intego&#8217;s research team encountered Google search results that, when clicked, pass through multiple redirection sites and end up on a page that claims the visitor&#8217;s Flash Player is out of date, and displays deceptive warnings and fake dialog boxes to entice the victim to download a supposed Flash Player updater\u2014which is, in fact, a Trojan horse.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-91619\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-1024x676.png\" alt=\"OSX\/Shlayer deceptive site, June 2020\" width=\"1024\" height=\"676\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-1024x676.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-300x198.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-150x99.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-768x507.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-1536x1014.png 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020-657x434.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Shlayer-deceptive-site-June-2020.png 1918w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>This newly re-engineered malware purports to be a legitimate Flash Player installer, but it has the capability to surreptitiously download and install additional unwanted packages containing adware or spyware.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-88573\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-325x350-139x150.png\" alt=\"OSX\/CrescentCore logo\" width=\"139\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-325x350-139x150.png 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-325x350-279x300.png 279w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/OSX-CrescentCore-logo-325x350.png 325w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/>This is far from the first time that search engine results have led to in-browser fake dialog boxes and malicious downloads; this has been happening for <a href=\"https:\/\/security.thejoshmeister.com\/2009\/12\/so-you-think-you-can-trust-google.html\" target=\"_blank\" rel=\"noopener noreferrer\">more than a decade<\/a>.<\/p>\n<p>Last year, Intego was also the first to discover <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\" target=\"_blank\" rel=\"noopener noreferrer\">OSX\/CrescentCore<\/a>, another example of search results leading to Mac malware. Like the new Shlayer variant, CrescentCore was a Trojan horse disguising itself as a Flash Player installer.<a name=\"can-google-stop\"><\/a><\/p>\n<h3>Can&#8217;t Google stop this?<\/h3>\n<p>Although in this particular case the malware was found via Google search results, the same thing could happen with any search engine: Bing, Yahoo!, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/duckduckgo\/\" target=\"_blank\" rel=\"noopener noreferrer\">DuckDuckGo<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meet-startpage-the-worlds-most-private-search-engine\/\" target=\"_blank\" rel=\"noopener noreferrer\">Startpage<\/a>, Ecosia, or any others.<\/p>\n<p>Search engines face numerous challenges in trying to prevent poisoned search results that lead to malware.<\/p>\n<p>For one thing, malware is constantly changing in order to evade detection, as evidenced by this new malware campaign. Even if Google had scanned the site for known malware before indexing it, Google wouldn&#8217;t have found any, because the malware was brand new and as-yet undiscovered.<\/p>\n<p>For another thing, pages are often designed to dynamically present different content depending on the context. If a Web server determines that Google is crawling the site, it may present an entirely different page from the one you might see if you go directly to the URL in your browser\u2014and that page may be different from the page you&#8217;d see if you click on a link in Google search results (meaning google.com is the &#8220;referrer&#8221;), as was the case with this campaign.<\/p>\n<p>It may not be an impossible task, but it&#8217;s certainly a significant challenge to try to keep all potentially harmful content from appearing in search results.<\/p>\n<p>Intego has reported the known-malicious search results to Google.<a name=\"macos-protections-bypass\"><\/a><\/p>\n<h3>How does the malware bypass protections built into macOS?<\/h3>\n<p>A lot of Mac malware in the past couple years has been &#8220;signed&#8221; by an Apple Developer Account, meaning that the malware maker has paid for an Apple account (or at least hijacked a legitimate developer&#8217;s account) in order to get special access to developer resources (and, in some cases, less scrutiny from built-in protections in macOS).<\/p>\n<p>Interestingly, the makers of this malware didn&#8217;t even bother getting an Apple Developer Account. Instead, they used a sneaky tactic to trick victims into bypassing Apple&#8217;s built-in protections.<\/p>\n<p>Normally, as of macOS Catalina, users will see a dialog box like this if they double-click on a Mac app that isn&#8217;t signed with a valid (and non-revoked) Apple Developer Account:<\/p>\n<div id=\"attachment_91667\" style=\"width: 852px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-91667\" loading=\"lazy\" class=\"size-full wp-image-91667\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned.jpg\" alt=\"Catalina alert message: macOS cannot verify that this app is free from malware.\" width=\"842\" height=\"366\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned.jpg 842w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-300x130.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-150x65.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-768x334.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-657x286.jpg 657w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><p id=\"caption-attachment-91667\" class=\"wp-caption-text\">Catalina alert message: &#8220;macOS cannot verify that this app is free from malware.&#8221; Image: <a href=\"https:\/\/support.apple.com\/HT202491\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a>.<\/p><\/div>\n<p>By tricking a user into &#8220;right-clicking&#8221; (<a href=\"https:\/\/support.apple.com\/guide\/mac-help\/open-a-mac-app-from-an-unidentified-developer-mh40616\/mac\" target=\"_blank\" rel=\"noopener noreferrer\">Apple calls this Control-clicking<\/a>) on a malware app and clicking Open, victims will instead see a dialog box more like this:<\/p>\n<div id=\"attachment_91668\" style=\"width: 948px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-91668\" loading=\"lazy\" class=\"size-full wp-image-91668\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-override.jpg\" alt=\"Catalina alert message: By opening this app, you will be overriding system security which can expose your computer and personal information to malware.\" width=\"938\" height=\"394\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-override.jpg 938w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-override-300x126.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-override-150x63.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-override-768x323.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/macos-catalina-alert-unsigned-override-657x276.jpg 657w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><p id=\"caption-attachment-91668\" class=\"wp-caption-text\">Catalina alert message: &#8220;By opening this app, you will be overriding system security which can expose your computer and personal information to malware that may harm your Mac or compromise your privacy.&#8221; Image: <a href=\"https:\/\/support.apple.com\/HT202491\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a>.<\/p><\/div>\n<p>Note that in this slightly different dialog box, there&#8217;s an &#8220;Open&#8221; button. In this case, the malware makers are hoping you&#8217;ll ignore Apple&#8217;s fine print and instead blindly follow the instructions from the malicious disk image&#8217;s background image.<a name=\"how-to-remove\"><\/a><\/p>\n<h3>How can the malware be removed?<\/h3>\n<p>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/buynow\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can detect and eliminate this malware. (Customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected.)<\/p>\n<p>Very few other third-party antivirus solutions are known to detect it, as of when this article was last updated.<a name=\"victims\"><\/a><\/p>\n<h3>Are there a lot of victims of this specific malware?<\/h3>\n<p>In general, fake Flash Player installers seem to be very successful, since Mac malware makers have continued to use Flash installers as a Trojan horse for nearly a decade.<\/p>\n<p><em>Related: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware<\/a><\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"MpUVNjxrnY\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/\">Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/embed\/#?secret=MpUVNjxrnY\" data-secret=\"MpUVNjxrnY\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>For this specific malware campaign, it remains unclear how many sites are offering the malware and how many varieties of search results are poisoned. Because the malware is brand new, it remains to be seen how widespread infections are.<\/p>\n<p>However, there is a design flaw in the initial stage of the malware that may help prevent infections from escalating beyond opening the disk image. After the disk image mounts, it instructs the victim to &#8220;right-click&#8221; on the installer, which may be a bit puzzling to many casual Mac users. Unlike typical Windows PCs, there is no obvious right-side button on Apple mice and trackpads. Therefore, novice Mac users may not know how to do the Mac equivalent of a right-click, and therefore may not understand how to run the malware installer script.<a name=\"creators\"><\/a><\/p>\n<h3>What is known about the creators of this malware?<\/h3>\n<p>The company behind this malware has chosen<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\"> a rather generic name for itself, FlashDownloader, and they claim in their <code>license.txt<\/code> file that you can contact them at info@flashdownloader.pro. The domain flashdownloader[.]pro was registered on June 8, 2020, just days before the malware was first observed in the wild.<\/span><\/p>\n<p>Interestingly, it appears that the company behind this new Shlayer variant also has ties to a supposedly &#8220;safe, secure and fast&#8221; Web browser<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">with a built-in &#8220;free VPN&#8221;<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\"> for Windows, and they claim that a Mac version is coming soon.<\/span><\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-91620\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-881x1024.png\" alt=\"Defender Browser homepage (affiliated with the latest OSX\/Shlayer variant)\" width=\"500\" height=\"581\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-881x1024.png 881w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-258x300.png 258w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-129x150.png 129w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-768x893.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-1321x1536.png 1321w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage-657x764.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/Defender-Browser-homepage.png 1352w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The Windows version of this browser is not currently detected as a potentially unwanted program (PUP\/PUA) by any anti-malware software, according to VirusTotal. However, as we&#8217;ve previously warned our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-free-means-collects-your-browser-history\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog readers<\/a> and <a href=\"https:\/\/podcast.intego.com\/120\" target=\"_blank\" rel=\"noopener noreferrer\">podcast listeners<\/a>, it&#8217;s good to be a bit skeptical about things that normally cost money but that someone claims to offer completely free (for example, a free VPN service). If a service that&#8217;s expensive to operate is being offered free of charge, this often means that <em>your data<\/em> is the product that generates revenue for the company.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>The following SHA256 hashes have been observed so far from this malware campaign:<\/p>\n<pre>flashInstaller.dmg\r\ndisk image; initial download, usually in ~\/Downloads\r\nd49ee2850277170d6dc7ef5f218b0697683ffd7cc66bd1a55867c4d4de2ab2fb\r\n97ef25ad5ffaf69a74f8678665179b917007c51b5b69d968ffd9edbfdf986ba0\r\n\r\nflashInstaller\r\nbash script; installer on disk image; unsigned\r\n86561207a7ebeb29771666bdc6469d81f9fc9f57eedda4f813ca3047b8162cfb\r\n2c2c611965f7b9c8e3524a77da9b2ebedf1b7705e6276140cffe2c848bff9113\r\n\r\nflashInstaller.zip\r\ntemp file created by the script\r\n3cd3f207a0f2ba512a768ce5ea939c1aed812f6c8f185c1838bfc98ffd9b006e\r\nbdbfefab84527b868eb073ece6eff6f5b83dc8d9ed33fe0a824ffee3b9f47b6e\r\n\r\nInstaller\r\nfound within a .app in a subfolder of \/private\/var\/folders\r\nMach-O macOS binary; self-signed\r\n05b9383b6af36e6bf232248bf9ff44e9120afcf76e50ac8aa28f09b3307f4186\r\n907c31b2da15aa14d06c6e828eef6ca627bd1af88655314548f747e5ed2f5697<\/pre>\n<p>The following domains have been observed as directly affiliated with this malware campaign, i.e. fake Flash warnings, file hosting, or communication servers:<\/p>\n<pre>youdontcare[.]com\r\ndisplay[.]monster\r\nyougotupdated[.]com\r\ninstallerapi[.]com\r\nuzasignals[.]com<\/pre>\n<p>Any network traffic to or from the domains above should be considered a possible sign of an infection.<\/p>\n<p>There is also some evidence to suggest that the following additional domains may be related to this campaign in various ways:<\/p>\n<pre>flashdownloader[.]pro\r\ndefenderbrowser[.]com\r\ninstallvibes[.]com<\/pre>\n<p><em>Update:<\/em> A couple weeks after Intego published this article, a separate analysis of this malware was written up by Phil Stokes <a href=\"https:\/\/www.sentinelone.com\/blog\/how-a-new-macos-malware-dropper-delivers-vindinstaller-adware\/\" target=\"_blank\" rel=\"noopener noreferrer\">at SentinelOne&#8217;s blog<\/a>, which contains additional IOCs for related samples.<br \/>\n<a name=\"learn-more\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" sizes=\"(max-width: 50px) 100vw, 50px\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" alt=\"\" width=\"50\" height=\"50\" data-pagespeed-url-hash=\"2337344131\" \/><\/a>We talked about this new malware on <a href=\"https:\/\/podcast.intego.com\/140\">episode 140<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>\u2014be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes. You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+-MHfh2WO?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into bypassing Apple&#8217;s built-in macOS security protections, and it uses sneaky tactics in an effort to evade antivirus detection. As of Friday, the new malware installer and its payload had a 0\/60 detection [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":52474,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[3619,4096,3928],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Mac malware reveals Google searches can be unsafe - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-16T06:59:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-13T08:37:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/\",\"name\":\"New Mac malware reveals Google searches can be unsafe - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#primaryimage\"},\"datePublished\":\"2020-06-16T06:59:26+00:00\",\"dateModified\":\"2021-05-13T08:37:41+00:00\",\"description\":\"Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Mac malware reveals Google searches can be unsafe\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"New Mac malware reveals Google searches can be unsafe\",\"datePublished\":\"2020-06-16T06:59:26+00:00\",\"dateModified\":\"2021-05-13T08:37:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#webpage\"},\"wordCount\":1801,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"keywords\":[\"Mughthesec\",\"OSX\/Bundlore\",\"OSX\/Shlayer\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/","og_locale":"en_US","og_type":"article","og_title":"New Mac malware reveals Google searches can be unsafe - The Mac Security Blog","og_description":"Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-06-16T06:59:26+00:00","article_modified_time":"2021-05-13T08:37:41+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","width":400,"height":260,"caption":"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/","name":"New Mac malware reveals Google searches can be unsafe - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#primaryimage"},"datePublished":"2020-06-16T06:59:26+00:00","dateModified":"2021-05-13T08:37:41+00:00","description":"Intego has discovered new Mac malware in the wild, actively spreading through malicious results in Google searches. The new malware tricks victims into","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Mac malware reveals Google searches can be unsafe"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"New Mac malware reveals Google searches can be unsafe","datePublished":"2020-06-16T06:59:26+00:00","dateModified":"2021-05-13T08:37:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#webpage"},"wordCount":1801,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","keywords":["Mughthesec","OSX\/Bundlore","OSX\/Shlayer"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nPC","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91612"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91612"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91612\/revisions"}],"predecessor-version":[{"id":93833,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91612\/revisions\/93833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52474"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}