{"id":92329,"date":"2020-10-21T16:19:38","date_gmt":"2020-10-21T23:19:38","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92329"},"modified":"2021-02-25T06:43:17","modified_gmt":"2021-02-25T14:43:17","slug":"apple-notarizes-new-mac-malware-again","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/","title":{"rendered":"Apple notarizes new Mac malware\u2026\u00a0again"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-92331\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>For the second time in six weeks, Apple has been caught notarizing Mac malware.<\/p>\n<p>Intego <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\" target=\"_blank\" rel=\"noopener noreferrer\">previously reported<\/a> that Apple inadvertently notarized more than 40 malware samples in August.<\/p>\n<p>This time, rather than the notarized malware belonging to the OSX\/Shlayer and OSX\/Bundlore families, the latest malware is from the\u00a0<strong>OSX\/MacOffers<\/strong> (aka MaxOfferDeal) family.<\/p>\n<p>All of the half-dozen samples of Trojan disk image (.dmg) files, as well as the malware&#8217;s first-stage Trojan application, had a <strong>0% detection rate on VirusTotal<\/strong> when they were first uploaded between October 6 and 13. Meanwhile, a sample of the second-stage malicious payload was only detected by <strong>4 out of 60 antivirus engines<\/strong> on VirusTotal as of October 12.<\/p>\n<p>The new malware uses a technique called steganography to hide its malicious payload within a separate JPEG image file, which is likely why the malware was able to slip past Apple&#8217;s notarization process.<\/p>\n<h3>Why is\u00a0notarized malware noteworthy?<\/h3>\n<p>Mac software developers submit apps to the Apple notary service, and Apple runs automated scans to check for malicious content. If the software appears to be malware-free, then Apple automatically notarizes it.<\/p>\n<p>When Apple notarizes an app, it&#8217;s much easier for users to run the app on macOS Mojave, macOS Catalina, and the upcoming macOS Big Sur. (One can double-click on a notarized app to open it. However, one must control-click or right-click to open non-notarized apps.)<\/p>\n<p>Therefore, there&#8217;s a significantly higher chance that victims will install Trojan horse malware that has sneaked through Apple&#8217;s notarization process undetected.<\/p>\n<p>The discovery of this malware marks the second time that Apple is known to have notarized Mac malware samples; the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-dozens-of-mac-malware-samples\/\" target=\"_blank\" rel=\"noopener noreferrer\">first known incident<\/a> was discovered several weeks earlier, in late August.<\/p>\n<h3>How does this malware use steganography?<\/h3>\n<p>Steganography is the ancient technique of stealthily hiding secret information inside something in plain sight. In this case, the application bundle found on the disk image contains a JPEG graphic file that seems innocuous to the naked eye. However, the JPEG contains a Base64-encoded .zip archive file that contains another malicious app.<\/p>\n<div id=\"attachment_92354\" style=\"width: 966px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-92354\" loading=\"lazy\" class=\"size-full wp-image-92354\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/steganographic-osx-macoffers-maxofferdeal-jpeg.png\" alt=\"Steganographic OSX.MacOffers (MaxOfferDeal) JPEG file\" width=\"956\" height=\"754\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/steganographic-osx-macoffers-maxofferdeal-jpeg.png 956w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/steganographic-osx-macoffers-maxofferdeal-jpeg-300x237.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/steganographic-osx-macoffers-maxofferdeal-jpeg-150x118.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/steganographic-osx-macoffers-maxofferdeal-jpeg-768x606.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/steganographic-osx-macoffers-maxofferdeal-jpeg-657x518.png 657w\" sizes=\"(max-width: 956px) 100vw, 956px\" \/><p id=\"caption-attachment-92354\" class=\"wp-caption-text\">A JPEG image file within the app bundle steganographically hides a malicious payload.<\/p><\/div>\n<p>We&#8217;ve observed steganography used before in Mac malware. Notable examples include the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/verymal-mac-attack-hides-data-within-a-picture\/\" target=\"_blank\" rel=\"noopener noreferrer\">VeryMal<\/a> Shlayer campaign in 2019 and the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/macdefender\/\" target=\"_blank\" rel=\"noopener noreferrer\">MacDefender<\/a> fake antivirus family in 2011.<\/p>\n<h3>How was the malware distributed?<\/h3>\n<p>This latest malware threat has been observed in the wild.<\/p>\n<p>Mac malware researcher Matt Muir discovered the first sample while hunting for malware amongst cracked software.<\/p>\n<p>&#8220;Cracked software&#8221; refers to software that has been modified to remove registration requirements or other restrictions that limit software functionality. Malware makers sometimes try to exploit the na\u00efvet\u00e9 of people who seek to obtain commercial software without paying for it.<\/p>\n<p><em>See also:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"u03eCnqJQm\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/\">Why BitTorrent Sites Are a Malware Cesspool<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Why BitTorrent Sites Are a Malware Cesspool&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/why-bittorrent-sites-are-a-malware-cesspool\/embed\/#?secret=u03eCnqJQm\" data-secret=\"u03eCnqJQm\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>As is typical of most Mac malware these days, the latest OSX\/MacOffers variant disguises itself as an Adobe Flash Player installer.<\/p>\n<div id=\"attachment_92358\" style=\"width: 992px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-92358\" loading=\"lazy\" class=\"size-full wp-image-92358\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/OSX-MacOffers-Double-Click-to-Install-Flash-Player-Trojan-Installer-disk-image-dmg.png\" alt=\"OSX\/MacOffers Double Click to Install Flash Player Trojan Installer mounted .dmg disk image\" width=\"982\" height=\"998\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/OSX-MacOffers-Double-Click-to-Install-Flash-Player-Trojan-Installer-disk-image-dmg.png 982w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/OSX-MacOffers-Double-Click-to-Install-Flash-Player-Trojan-Installer-disk-image-dmg-295x300.png 295w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/OSX-MacOffers-Double-Click-to-Install-Flash-Player-Trojan-Installer-disk-image-dmg-148x150.png 148w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/OSX-MacOffers-Double-Click-to-Install-Flash-Player-Trojan-Installer-disk-image-dmg-768x781.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/OSX-MacOffers-Double-Click-to-Install-Flash-Player-Trojan-Installer-disk-image-dmg-657x668.png 657w\" sizes=\"(max-width: 982px) 100vw, 982px\" \/><p id=\"caption-attachment-92358\" class=\"wp-caption-text\">OSX\/MacOffers arrives as a Flash Player-mimicking Trojan horse.<\/p><\/div>\n<p>In 2020, nobody should believe any site that prompts them to download or update Flash. Adobe plans to discontinue security updates for the real Flash Player at the end of this year. Most browsers have already dropped support for Flash Player or disable it by default. Unfortunately, most end users are probably unaware of these facts, given that malware makers seem to still find success with fake Flash installers.<\/p>\n<p>Until sometime within the next couple months, Google Chrome will continue to have its own built-in version of Flash that updates automatically along with the browser itself, so if you need to access sites with Flash content, you can still use Chrome for now. <em>Never<\/em> install Flash Player if you&#8217;re prompted to; it&#8217;s a telltale sign of malware.<\/p>\n<p><em>See also:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YLDIXvBbyw\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/\">Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/embed\/#?secret=YLDIXvBbyw\" data-secret=\"YLDIXvBbyw\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can one stay safe from notarized malware?<\/h3>\n<p>Notarized Mac malware will very likely continue to be a problem, as malware makers try old and new techniques to attempt to circumvent Apple&#8217;s automated malware checks.<\/p>\n<p>In this case, Apple revoked the malware developer&#8217;s known certificate on or around October 12. This should help prevent new infections of the samples that have been found so far.<\/p>\n<p>However, this certificate revocation doesn&#8217;t necessarily help Macs that have already become infected. It also doesn&#8217;t prevent the malware maker from registering new Apple Developer IDs and attempting to get new malware samples notarized. Furthermore, most Mac users aren&#8217;t using a trusted antivirus with real-time scanning, which often blocks new malware threats that Apple hasn&#8217;t mitigated.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Thankfully, we&#8217;ve got you covered. Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate this malware.<\/p>\n<p><span style=\"font-size: small;\">Note: Customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected. It is best to upgrade to the latest version of VirusBarrier and macOS if possible to ensure your Mac gets all the latest security updates from Apple.<\/span><a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IoCs)<\/h3>\n<p>Following are some specific ways to identify whether a Mac may have been infected by this OSX\/MacOffers campaign.<\/p>\n<p>This malware has been observed using the generic-sounding filename &#8220;Player.dmg&#8221; for the initial infection phase. The existence of a file with that exact name in the ~\/Downloads folder may be a possible sign of infection.<\/p>\n<p>The malicious installer app uses a Bundle ID that does not follow expected patterns. Normally an app&#8217;s bundle identifier uses reverse domain name notation, for example com.apple.Safari or org.mozilla.firefox. However, this malware&#8217;s Bundle ID is:<\/p>\n<pre>someorgident.notarized<\/pre>\n<p>The copyright info for the first-stage Trojan horse identifies the company as &#8220;someorg.&#8221;<\/p>\n<p>Apple has since revoked the Developer ID that was used for signing and requesting notarization of this malware. The developer name and Team ID of the revoked dev account is:<\/p>\n<pre>Maria Robinson (4DNKNBX6DS)<\/pre>\n<p>The following SHA-256 file hashes belong to known OSX\/MacOffers files associated with this malware campaign. All of these samples are available to registered VirusTotal users with malware researcher accounts.<\/p>\n<pre>DMG disk image files:\r\n10495e1bf0f7fc895c832532feab47311f9084a428454793e3160e644c385bdd\r\n37b833b0b7a19723b5532e71352b9d6699b7be8086acf4ea225f9d639566a613\r\n4e24d9f28668780c58082b605769e774e881f0dff8863e6ec920352e6bcc219d\r\n651d16f01892b51817986689d2ff432e354b722d2e67fda2cfea3aee05fa9fcd\r\n9c540d3cd6858d9e27c9e94e8d6d0528828e3e56c9153f08958fa8e413c31c51\r\ne4b9a43e114aae4a706f757d190dc4be5560ef643bcfb9fd37290db8c8fb9fb0\r\n\r\nMach-O first-stage executable:\r\n64ad034cc793d6cad9a0e0d0ffe3dc840169cd0dbc164cd2188bb2f6684a6de9\r\n\r\nMach-O second-stage payload:\r\n9fefc4d588b6e9f667a77eb9cd0c5e86ac0b6083845e84a1dcba1791211ef419<\/pre>\n<p>The following domain has been observed distributing this malware, and is also found in a hidden .Info.plist file on the mounted disk images:<\/p>\n<pre>www.jurisdiction[.]world<\/pre>\n<p>Any recent network traffic to or from this domain should be considered a possible sign of an infection.<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" sizes=\"(max-width: 50px) 100vw, 50px\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" alt=\"\" width=\"50\" height=\"50\" data-pagespeed-url-hash=\"2337344131\" \/><\/a>We discussed the latest Apple-notarized malware (as well as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/gravityrat-and-ipstorm-mac-malware-ported-from-windows\/\">two malware families recently ported\u00a0 to Mac<\/a>) on <a href=\"https:\/\/podcast.intego.com\/158\">episode 158<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes. You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+eQF1_uQc?base_slug=intego&amp;theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n<h3>Acknowledgements<\/h3>\n<p>In addition to Intego&#8217;s malware analysis team, the author would like to thank <a href=\"https:\/\/twitter.com\/_mattmuir\" target=\"_blank\" rel=\"noopener noreferrer\">Matt Muir<\/a> for sharing details with us about his malware discovery, and <a href=\"https:\/\/twitter.com\/thomasareed\" target=\"_blank\" rel=\"noopener noreferrer\">Thomas Reed<\/a> for additional contributions to this research.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.<\/p>\n","protected":false},"author":14,"featured_media":92338,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4608,86,4598],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple notarizes new Mac malware\u2026\u00a0again - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-21T23:19:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-25T14:43:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple notarizes Mac malware again\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/\",\"name\":\"Apple notarizes new Mac malware\\u2026\\u00a0again - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#primaryimage\"},\"datePublished\":\"2020-10-21T23:19:38+00:00\",\"dateModified\":\"2021-02-25T14:43:17+00:00\",\"description\":\"Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple notarizes new Mac malware\\u2026\\u00a0again\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple notarizes new Mac malware\\u2026\\u00a0again\",\"datePublished\":\"2020-10-21T23:19:38+00:00\",\"dateModified\":\"2021-02-25T14:43:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#webpage\"},\"wordCount\":1165,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png\",\"keywords\":[\"Apple Software Notarization\",\"Malware\",\"OSX\/MacOffers\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/","og_locale":"en_US","og_type":"article","og_title":"Apple notarizes new Mac malware\u2026\u00a0again - The Mac Security Blog","og_description":"Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-10-21T23:19:38+00:00","article_modified_time":"2021-02-25T14:43:17+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png","width":400,"height":260,"caption":"Apple notarizes Mac malware again"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/","name":"Apple notarizes new Mac malware\u2026\u00a0again - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#primaryimage"},"datePublished":"2020-10-21T23:19:38+00:00","dateModified":"2021-02-25T14:43:17+00:00","description":"Intego exclusive: For the second time in six weeks, Apple has been caught notarizing Mac malware. This OSX\/MacOffers (MaxOfferDeal) variant uses steganography and has a 0% detection rate on VirusTotal.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple notarizes new Mac malware\u2026\u00a0again"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple notarizes new Mac malware\u2026\u00a0again","datePublished":"2020-10-21T23:19:38+00:00","dateModified":"2021-02-25T14:43:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#webpage"},"wordCount":1165,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png","keywords":["Apple Software Notarization","Malware","OSX\/MacOffers"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-notarizes-new-mac-malware-again\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/notarized-malware-again-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-o1b","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92329"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92329"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92329\/revisions"}],"predecessor-version":[{"id":92802,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92329\/revisions\/92802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/92338"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}