{"id":92237,"date":"2020-08-31T23:06:34","date_gmt":"2020-09-01T06:06:34","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92237"},"modified":"2024-05-16T12:54:15","modified_gmt":"2024-05-16T19:54:15","slug":"apple-notarizes-dozens-of-mac-malware-samples","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/","title":{"rendered":"Apple notarizes dozens of Mac malware samples"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-92242\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs.<\/p>\n<p>The malware samples are related to the <strong>OSX\/Bundlore<\/strong> and <strong>OSX\/Shlayer<\/strong> families. Intego VirusBarrier customers are protected from these threats.<\/p>\n<p>Let&#8217;s explore what happened, and why it&#8217;s important to not rely entirely on Apple&#8217;s attempts to protect Mac users from malware.<\/p>\n<h3>What is notarization?<\/h3>\n<p>In 2019 Apple debuted a <a href=\"https:\/\/developer.apple.com\/documentation\/xcode\/notarizing_macos_software_before_distribution\" target=\"_blank\" rel=\"noopener noreferrer\">software notarization<\/a> process. A developer submits their app to the Apple notary service, and Apple runs automated scans to check for malicious content. If the software appears to be clean and legitimate, Apple will notarize it.<\/p>\n<p>After Apple notarizes an app, it&#8217;s much easier for users to run the app on macOS Mojave, macOS Catalina, and future versions including macOS Big Sur.<\/p>\n<div id=\"attachment_92243\" style=\"width: 988px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-92243\" loading=\"lazy\" class=\"size-full wp-image-92243\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/big-sur-notarized-mac-malware.png\" alt=\"Screenshot of notarized Mac malware running on macOS Big Sur\" width=\"978\" height=\"736\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/big-sur-notarized-mac-malware.png 978w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/big-sur-notarized-mac-malware-300x226.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/big-sur-notarized-mac-malware-150x113.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/big-sur-notarized-mac-malware-768x578.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/big-sur-notarized-mac-malware-657x494.png 657w\" sizes=\"(max-width: 978px) 100vw, 978px\" \/><p id=\"caption-attachment-92243\" class=\"wp-caption-text\">Notarized apps, like this malware, are blessed with an Open button when double-clicked for the first time. Image: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x4E.html\" target=\"_blank\" rel=\"noopener noreferrer\">Wardle<\/a><\/p><\/div>\n<p>Notably, notarization is not as comprehensive as the <a href=\"https:\/\/developer.apple.com\/app-store\/review\/\" target=\"_blank\" rel=\"noopener noreferrer\">App Review<\/a> process that Apple employs before accepting apps into its App Stores. App Review employs both automated and manual human reviews of software to ensure compliance with Apple&#8217;s policies.<\/p>\n<h3>Why did Apple notarize malware?<\/h3>\n<p>Presumably, Apple&#8217;s automated notarization process failed to correctly determine that the malware submissions were malicious.<\/p>\n<p>At least three different Apple Developer IDs were used to code-sign more than 40 unique malware samples associated with this campaign.<\/p>\n<h3>How was the malware distributed?<\/h3>\n<p>The malware distributors registered the domain homebrew[.]sh, hoping to ensnare victims looking for Homebrew, legitimate Mac software which has its actual homepage at brew.sh. (This is known as a typosquatting attack.)<\/p>\n<p>Instead of reaching the Homebrew homepage, victims were taken to a page with a fake Adobe Flash Player updater\u2014a Trojan horse that installs adware. Mac users should avoid downloading or installing anything that claims to be Flash Player.<\/p>\n<p><em>See also:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"qEl0eY9YtQ\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/\">Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/embed\/#?secret=qEl0eY9YtQ\" data-secret=\"qEl0eY9YtQ\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Why are Apple&#8217;s protection attempts insufficient?<\/h3>\n<p>Apple employs a number of technologies and procedures to attempt to thwart Mac malware, including <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/xprotect\/\">XProtect<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/gatekeeper\/\">Gatekeeper<\/a>, notarization, and <a href=\"https:\/\/support.apple.com\/guide\/security\/app-security-overview-sec35dd877d0\/web\" target=\"_blank\" rel=\"noopener noreferrer\">more<\/a>.<\/p>\n<p>And yet, time and time again, in spite of Apple&#8217;s best efforts, malware makers continue to find ways to circumvent these measures and infect Macs.<\/p>\n<p>A significant percentage of Mac users don&#8217;t bother to use third-party endpoint protection software, such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">realtime anti-malware protection<\/a> or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-need-an-outbound-firewall\/\">outbound firewalls<\/a>. Many users probably have heard the myth that &#8220;Macs don&#8217;t get malware,&#8221; or perhaps they&#8217;ve heard of XProtect or other Apple technologies and assume that they will be protected.<\/p>\n<p>Because of this, malware makers generally need to merely bypass Apple&#8217;s built-in protection measures, which unfortunately is not very difficult to do.<\/p>\n<p>We recommend taking a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\">layered approach<\/a> to securing your Mac, and not relying alone on Apple&#8217;s often ineffectual attempts to protect Mac users.<\/p>\n<p><em>See also:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"IkuACYHzke\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Do Macs need antivirus software?&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/embed\/#?secret=IkuACYHzke\" data-secret=\"IkuACYHzke\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can one stay safe from this Apple-notarized malware?<\/h3>\n<p>Apple eventually revoked the malware developer&#8217;s known certificates, which should help prevent new infections of the known 40+ samples. However, this certificate revocation doesn&#8217;t necessarily help Macs that have already become infected. It also doesn&#8217;t prevent the malware maker from registering new Apple Developer IDs and attempting to get new malware samples notarized.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Thankfully, we&#8217;ve got you covered. Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate this malware.<\/p>\n<p><span style=\"font-size: small;\">Note: Customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected. It is best to upgrade to the latest version of macOS if possible to ensure your Mac gets all the latest security updates from Apple.<\/span><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For a more technical analysis of this malware, you can refer to <a href=\"https:\/\/objective-see.com\/blog\/blog_0x4E.html\" target=\"_blank\" rel=\"noopener noreferrer\">Patrick Wardle&#8217;s write-up<\/a>.<\/p>\n<p>We discussed the Apple-notarized malware on <a href=\"https:\/\/podcast.intego.com\/151\">episode 151<\/a>\u00a0of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>\u2014be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes. You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+Rtatt6eO?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the OSX\/Bundlore and OSX\/Shlayer families. Intego VirusBarrier customers are protected from these threats. Let&#8217;s explore what happened, and why it&#8217;s important to not rely entirely on Apple&#8217;s attempts to protect Mac users [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":92241,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4608,4738,86,4096,3928,2839],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple notarizes dozens of Mac malware samples - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-01T06:06:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T19:54:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Notarized Mac malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\",\"name\":\"Apple notarizes dozens of Mac malware samples - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#primaryimage\"},\"datePublished\":\"2020-09-01T06:06:34+00:00\",\"dateModified\":\"2024-05-16T19:54:15+00:00\",\"description\":\"From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple notarizes dozens of Mac malware samples\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple notarizes dozens of Mac malware samples\",\"datePublished\":\"2020-09-01T06:06:34+00:00\",\"dateModified\":\"2024-05-16T19:54:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#webpage\"},\"wordCount\":705,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png\",\"keywords\":[\"Apple Software Notarization\",\"Homebrew\",\"Malware\",\"OSX\/Bundlore\",\"OSX\/Shlayer\",\"Typosquatting\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/","og_locale":"en_US","og_type":"article","og_title":"Apple notarizes dozens of Mac malware samples - The Mac Security Blog","og_description":"From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-09-01T06:06:34+00:00","article_modified_time":"2024-05-16T19:54:15+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png","width":400,"height":260,"caption":"Notarized Mac malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/","name":"Apple notarizes dozens of Mac malware samples - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#primaryimage"},"datePublished":"2020-09-01T06:06:34+00:00","dateModified":"2024-05-16T19:54:15+00:00","description":"From mid-to-late August, Apple has inadvertently enabled dozens of malware samples to run more easily on Macs. The malware samples are related to the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple notarizes dozens of Mac malware samples"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple notarizes dozens of Mac malware samples","datePublished":"2020-09-01T06:06:34+00:00","dateModified":"2024-05-16T19:54:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#webpage"},"wordCount":705,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png","keywords":["Apple Software Notarization","Homebrew","Malware","OSX\/Bundlore","OSX\/Shlayer","Typosquatting"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nZH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92237"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92237"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92237\/revisions"}],"predecessor-version":[{"id":100593,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92237\/revisions\/100593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/92241"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}