	{"id":9241,"date":"2012-12-19T10:17:12","date_gmt":"2012-12-19T18:17:12","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=9241"},"modified":"2016-02-12T10:34:11","modified_gmt":"2016-02-12T18:34:11","slug":"what-does-in-the-wild-mean-when-talking-about-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/","title":{"rendered":"What Does \u201cIn the Wild\u201d Mean When Talking About Malware?"},"content":{"rendered":"<p>One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If your thoughts go to Jaques Cousteau or Mutual of Omaha\u2019s Wild Kingdom, you\u2019re on the right track. It\u2019s meant to differentiate from malware that has affected real people\u2019s machines and threats that only exist \u201cin the zoo\u201d: that is to say, only in research labs.<\/p>\n<h3>In the Beginning<\/h3>\n<p>Once upon a time, there was an independent organization that was called the Wildlist, which produced a report by the same name. Every month, a list was compiled of all the viruses (not Trojans yet) that had been reported to their list of reporters. The Wildlist reporters were trusted researchers from around the industry \u2013 not just from AV vendors, but also from companies that had a good view into what was affecting corporate as well as home users.<\/p>\n<p>To make the \u201cmain list,\u201d a threat had to be reported at least two times to two separate reporters. Reporters would note how many times viruses were reported to them, and in what countries, for every threat they encountered more than once. They would take and replicate the virus samples to verify that they were valid infections (and so that the sample would be in a neutral, standard file without user-info attached, if possible). Then they would send this collection in every month. The idea is that this would create a fairly representative list of what was affecting users.<\/p>\n<p>There were plenty of threats that did not make the main list because they were not reported twice. These would be noted on the Extended Wildlist. But you\u2019ll note, this did not include everything a reporter received only once. The list was not meant to be exhaustive because there are always plenty of cases of infections that exist only on someone\u2019s machine that was stored in some far-off corner, with a virus that was last prevalent ten years ago. There is no way of saying conclusively that a virus only exists \u201cin the zoo\u201d \u2013 the idea was to report those things that people were more likely to run across.<\/p>\n<h3>The Present Tense<\/h3>\n<p>Many years later, the malware world has changed quite a bit. Trojans used to be something that people quibbled about including in anti-virus products (because they\u2019re not viruses, see\u2026). Now Trojans make up the bulk of files detected by those same products (even though most folks still usually refer to them as anti-virus products, rather than anti-malware products). The tactics of malware writers has changed so that thousands of new variants are pumped out for many major malware families. Speed and stealth are the order of the day, not prevalence. The overwhelming numbers of malware samples that are found every day, particularly for Windows and Android, have made gathering such a list effectively impossible.<\/p>\n<p>That doesn\u2019t mean the information about threats affecting real people is any less valuable than it was 10 or 20 years ago. But now it\u2019s less official, and more reflective of whether a threat has or likely could affect a large number of customers. We still get some threats that are \u201czoo threats,\u201d especially in Mac-land where overall prevalence is low enough that people are still interested in creating \u201cproof of concept\u201d threats to show that it can be done. We report in each malware alert whether we have seen evidence that this threat is affecting real customers or if it is not yet known to be in the wild. This way you can determine how urgently you need to prepare yourself or if you should just update your virus definitions as normal.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If your thoughts go to Jaques Cousteau or Mutual of Omaha\u2019s Wild Kingdom, you\u2019re on the right track. It\u2019s meant to differentiate from malware that has affected [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[2782,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Does \u201cIn the Wild\u201d Mean When Talking About Malware? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-19T18:17:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:34:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/\",\"name\":\"What Does \\u201cIn the Wild\\u201d Mean When Talking About Malware? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#primaryimage\"},\"datePublished\":\"2012-12-19T18:17:12+00:00\",\"dateModified\":\"2016-02-12T18:34:11+00:00\",\"description\":\"One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \\u201cin the wild.\\u201d But what does that actually mean? If\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Does \\u201cIn the Wild\\u201d Mean When Talking About Malware?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What Does \\u201cIn the Wild\\u201d Mean When Talking About Malware?\",\"datePublished\":\"2012-12-19T18:17:12+00:00\",\"dateModified\":\"2016-02-12T18:34:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#webpage\"},\"wordCount\":630,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg\",\"keywords\":[\"In the Wild\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/","og_locale":"en_US","og_type":"article","og_title":"What Does \u201cIn the Wild\u201d Mean When Talking About Malware? - The Mac Security Blog","og_description":"One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-12-19T18:17:12+00:00","article_modified_time":"2016-02-12T18:34:11+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/","name":"What Does \u201cIn the Wild\u201d Mean When Talking About Malware? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#primaryimage"},"datePublished":"2012-12-19T18:17:12+00:00","dateModified":"2016-02-12T18:34:11+00:00","description":"One of those terms that get bounced around a lot, in discussions of malware is whether that threat is \u201cin the wild.\u201d But what does that actually mean? If","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What Does \u201cIn the Wild\u201d Mean When Talking About Malware?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What Does \u201cIn the Wild\u201d Mean When Talking About Malware?","datePublished":"2012-12-19T18:17:12+00:00","dateModified":"2016-02-12T18:34:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#webpage"},"wordCount":630,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg","keywords":["In the Wild","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/wild-things-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2p3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9241"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=9241"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9241\/revisions"}],"predecessor-version":[{"id":9305,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9241\/revisions\/9305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9295"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=9241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=9241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=9241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}