{"id":9309,"date":"2012-12-20T10:56:05","date_gmt":"2012-12-20T18:56:05","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=9309"},"modified":"2016-02-12T10:34:23","modified_gmt":"2016-02-12T18:34:23","slug":"windows-malware-is-not-limited-to-windows-users","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/","title":{"rendered":"Windows Malware is Not Limited to Windows Users"},"content":{"rendered":"<p>Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best operating strategy. Given the current market share of Windows, this means most of it will target Windows users. But even if they don&#8217;t manage to hit their target directly and the mud ends up on the ceiling, sometimes it will still make its way down the wall.<\/p>\n<p>As long as there has been malware spreading on the Internet, there has been Windows-targeted malware received by people on other operating systems. Much like how cybercriminals are more concerned with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/protect-your-data-not-just-your-computer\/\">what data they can steal<\/a> than what OS it came from, malware can\u2019t know what OS it will land on. Worst-case scenario from the malware\u2019s perspective would be that it lands on a system where it won\u2019t work, and it\u2019ll be summarily deleted. But there are a lot of possibilities between that end of the spectrum and successfully affecting a system.<\/p>\n<p>In many cases, if a file is received on an incorrect operating system, the file may be set aside and ignored. The malware could stay that way forever, its biggest downside being that it\u2019s taking up disk space. Or it could make its way to a system where the malicious file will do harm, either by someone sharing it intentionally (not knowing its true purpose), or unintentionally by saving it to a folder that\u2019s shared or synced.<\/p>\n<p>Admittedly, these seem like rare cases. But with the tens or hundreds of thousands of Windows malware discovered every day, it only needs to happen a small portion of the time to amount to quite a few instances. Detecting and removing malware regardless of its intended target is one of those things that could fall under the category of \u201cbeing a conscientious Netizen\u201d; by keeping your own system clear of malware, you\u2019re helping to keep your Internet friends and neighbors from harm.<\/p>\n<p>This is why most modern AV software detects not only threats for the OS they&#8217;re running, but all the various other OSes as well. This way, you&#8217;ll be able to identify and remove whatever malware comes your way, regardless of whether it can do your own system harm. But you shouldn&#8217;t be concerned that this extra detection will slow down the scanning on your non-Windows system unnecessarily; those same modern AV programs are smart enough to know the difference between file-types. If your scanner sees a file that only runs on a Mac, it will only scan it for malware that would appear in that Mac file-type. They&#8217;re optimized to exclude files as quickly as possible, so that you&#8217;ll see as little delay as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best operating strategy. Given the current market share of Windows, this means most of it will target Windows users. But even if they don&#8217;t manage to hit [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8785,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Malware is Not Limited to Windows Users - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-20T18:56:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:34:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/\",\"name\":\"Windows Malware is Not Limited to Windows Users - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#primaryimage\"},\"datePublished\":\"2012-12-20T18:56:05+00:00\",\"dateModified\":\"2016-02-12T18:34:23+00:00\",\"description\":\"Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows Malware is Not Limited to Windows Users\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Windows Malware is Not Limited to Windows Users\",\"datePublished\":\"2012-12-20T18:56:05+00:00\",\"dateModified\":\"2016-02-12T18:34:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#webpage\"},\"wordCount\":467,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg\",\"keywords\":[\"Malware\",\"Windows\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/","og_locale":"en_US","og_type":"article","og_title":"Windows Malware is Not Limited to Windows Users - The Mac Security Blog","og_description":"Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best","og_url":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-12-20T18:56:05+00:00","article_modified_time":"2016-02-12T18:34:23+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/","name":"Windows Malware is Not Limited to Windows Users - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#primaryimage"},"datePublished":"2012-12-20T18:56:05+00:00","dateModified":"2016-02-12T18:34:23+00:00","description":"Malware is a bit like mud: if someone throws enough of it at the wall, some of it will stick. For most financially motivated malware, this is the best","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Windows Malware is Not Limited to Windows Users"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Windows Malware is Not Limited to Windows Users","datePublished":"2012-12-20T18:56:05+00:00","dateModified":"2016-02-12T18:34:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#webpage"},"wordCount":467,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg","keywords":["Malware","Windows"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/windows-malware-is-not-limited-to-windows-users\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/microsoft-logo-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2q9","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9309"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=9309"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9309\/revisions"}],"predecessor-version":[{"id":9325,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9309\/revisions\/9325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8785"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=9309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=9309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=9309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}