{"id":9327,"date":"2012-12-27T09:46:54","date_gmt":"2012-12-27T17:46:54","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=9327"},"modified":"2016-02-12T10:34:31","modified_gmt":"2016-02-12T18:34:31","slug":"why-financially-motivated-malware-is-destructive","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/","title":{"rendered":"Why Financially Motivated Malware is Destructive"},"content":{"rendered":"<p>Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my coworkers enjoy my colorful outbursts, I\u2019m thinking maybe putting my commentary in blog-form is more effective than shouting at my screen.<\/p>\n<p>It blows my mind that technical and security-savvy people still downplay a threat as not \u201cdestructive\u201d malware if it doesn\u2019t automatically delete your cache of cat pictures, as if this is the worst damage that can be done to your machine. That really misses the point of why malware is created these days, and misses the possibility of non-automated damage.<\/p>\n<p>The biggest Mac malware of 2012, Flashback, was a backdoor Trojan. That is to say, it opened an affected machine up to access by the Trojan\u2019s controller \u2013 they could do whatever they wanted to it, including deleting your cache of cat pictures. As we said in an article from this summer, yes, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/yes-macs-can-get-malware\/\">Macs can get malware<\/a>, and that malware that opens your machine to remote control constitutes \u201cunlimited damage potential.\u201d Just because they don\u2019t automatically harm files on your machine does not mean damage (either financial or data) is not happening. I\u2019m sure anyone who has spent countless hours having to sort out a case of identity theft will disagree with the assessment that they&#8217;ve not been harmed. Or you can ask anyone whose <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\">online life has been compromised by hackers<\/a>, for instance.<\/p>\n<p>The purpose of malware these days (and by these days I mean for the last decade or so) is financial: Trojan authors want access to your machine so they can gather data that they can sell, or so they can use your machine to harm others. Long gone are the days of stereotypical creepy dudes in their parents\u2019 basement programming malware to cause the biggest mayhem, so they can see their creation mentioned on the evening news. Now it\u2019s creepy people programming malware to make beaucoup bucks stealing mass quantities of data.<\/p>\n<p>While I&#8217;m squarely against over-hyping threats, making it sound like every one-off malware is going to end the Internet, I&#8217;m not a fan of downplaying legitimate threats either. If people understand what cybercriminals are really going after and what is really at risk, they can protect themselves appropriately.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/truthout\/4708415912\/\">Truthout.org<\/a> and <a href=\"http:\/\/www.flickr.com\/photos\/jeremybrooks\/5679868061\/\">Jeremy Brooks<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my coworkers enjoy my colorful outbursts, I\u2019m thinking maybe putting my commentary in blog-form is more effective than shouting at my screen. It blows my mind that technical and security-savvy [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9347,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Financially Motivated Malware is Destructive - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-27T17:46:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:34:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/\",\"name\":\"Why Financially Motivated Malware is Destructive - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#primaryimage\"},\"datePublished\":\"2012-12-27T17:46:54+00:00\",\"dateModified\":\"2016-02-12T18:34:31+00:00\",\"description\":\"Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\\u2019m sure my\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Financially Motivated Malware is Destructive\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Why Financially Motivated Malware is Destructive\",\"datePublished\":\"2012-12-27T17:46:54+00:00\",\"dateModified\":\"2016-02-12T18:34:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#webpage\"},\"wordCount\":402,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg\",\"keywords\":[\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/","og_locale":"en_US","og_type":"article","og_title":"Why Financially Motivated Malware is Destructive - The Mac Security Blog","og_description":"Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my","og_url":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-12-27T17:46:54+00:00","article_modified_time":"2016-02-12T18:34:31+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/","name":"Why Financially Motivated Malware is Destructive - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#primaryimage"},"datePublished":"2012-12-27T17:46:54+00:00","dateModified":"2016-02-12T18:34:31+00:00","description":"Every now and again I read some article with a mistaken assumption about malware that inspires me to loudly express my displeasure. While I\u2019m sure my","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Why Financially Motivated Malware is Destructive"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Why Financially Motivated Malware is Destructive","datePublished":"2012-12-27T17:46:54+00:00","dateModified":"2016-02-12T18:34:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#webpage"},"wordCount":402,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg","keywords":["Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/why-financially-motivated-malware-is-destructive\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/dollar-sign-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2qr","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9327"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=9327"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9327\/revisions"}],"predecessor-version":[{"id":9361,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/9327\/revisions\/9361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9347"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=9327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=9327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=9327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}