{"id":94290,"date":"2021-08-26T15:32:23","date_gmt":"2021-08-26T22:32:23","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94290"},"modified":"2021-09-24T08:31:04","modified_gmt":"2021-09-24T15:31:04","slug":"osx-adload-mac-malware-apple-missed-for-many-months","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/","title":{"rendered":"OSX\/Adload: Mac Malware Apple Missed for Many Months"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52468\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In recent weeks, there has been increased awareness of a common Mac malware campaign dubbed <strong>Adload<\/strong>. It typically consists of a Trojan horse dropper app, often disguised as a Flash Player installer, which installs a LaunchAgent or LaunchDaemon as a method of persistence (so the malware can continue to infect the Mac whenever it gets powered on or restarted).<\/p>\n<p>Intego VirusBarrier X9 detects files from this Adload campaign as <strong>OSX\/Adload<\/strong>\u00a0and <strong>OSX\/Bundlore.zsh<\/strong>. However, Apple&#8217;s XProtect definitions built into macOS did not detect much of this malware until several months after it had already been infecting Macs.<\/p>\n<p>Read on for more details on this latest Mac malware threat.<\/p>\n<h3>How does Adload malware spread?<\/h3>\n<p>The latest OSX\/Adload variants arrive via an OSX\/Bundlore Trojan horse, which generally masquerades as an installer mimicking the icon art style of Adobe Flash Player, and continues to claim to be Flash Player during the installation process.<\/p>\n<div id=\"attachment_94292\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-94292\" loading=\"lazy\" class=\"size-full wp-image-94292\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/08\/OSX-Adload-fake-Adobe-Flash-Player-installer.png\" alt=\"OSX\/Adload fake Adobe Flash Player installer\" width=\"500\" height=\"479\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/08\/OSX-Adload-fake-Adobe-Flash-Player-installer.png 988w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/08\/OSX-Adload-fake-Adobe-Flash-Player-installer-300x287.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/08\/OSX-Adload-fake-Adobe-Flash-Player-installer-150x144.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/08\/OSX-Adload-fake-Adobe-Flash-Player-installer-768x735.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/08\/OSX-Adload-fake-Adobe-Flash-Player-installer-657x629.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><p id=\"caption-attachment-94292\" class=\"wp-caption-text\">An OSX\/Bundlore fake Adobe Flash Player installer, which actually installs OSX\/Adload. (Image: Intego)<\/p><\/div>\n<p>Most often, such Trojan horses are unintentionally encountered when a victim visits a malicious link, or a compromised (hacked) site that automatically redirects to a malicious download. In some cases, poisoned search results on Google or other search engines may lead to such malware.<\/p>\n<h3>Why does malware still pretend to be Flash Player?<\/h3>\n<p>Adobe Flash Player officially <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/\">ended security updates on December 31, 2020<\/a>, but that hasn&#8217;t stopped malware makers from disguising their Trojan horses as Flash installers.<\/p>\n<p>The reality is, however, that most non-geeks are unaware that Flash is past its end of life. At one point in Flash Player&#8217;s history, installing urgent Flash updates became an almost weekly occurrence, as new zero-day exploits for the bug-riddled software were found routinely.<\/p>\n<p>Old habits die hard, and many users have come to expect that they need to update Flash whenever they&#8217;re prompted to. For some, it has become an almost Pavlovian response\u2014and that seems to be what malware makers are banking on.<\/p>\n<p><em>As further discussed in:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"jhiscTkVVX\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/\">Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Adobe Flash Player is dead, yet 10% of Macs are infected with fake Flash malware&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/embed\/#?secret=jhiscTkVVX\" data-secret=\"jhiscTkVVX\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How long has the malware been around?<\/h3>\n<p>Intego has been detecting variations of OSX\/Adload malware for several years, since at least 2017. According to Intego&#8217;s internal tracking of Adload campaigns, there seemed to be a sudden reappearance of Adload around April 2020, and a further resurgence around September 2020.<\/p>\n<p>The current campaign appears to have begun in November 2020 (as <a href=\"https:\/\/labs.sentinelone.com\/massive-new-adload-campaign-goes-entirely-undetected-by-apples-xprotect\/\" target=\"_blank\" rel=\"noopener nofollow\">noted by Phil Stokes<\/a> in his technical deep dive) and continues today, in August 2021.<\/p>\n<p>Although <strong>Intego VirusBarrier<\/strong> users were already protected from the latest variants, <strong>Apple did not add signatures for the recent Adload\/Bundlore campaign to its XProtect definitions until August 23, 2021<\/strong>, as <a href=\"https:\/\/eclecticlight.co\/2021\/08\/23\/apple-has-pushed-updates-to-xprotect-and-mrt-27\/\" target=\"_blank\" rel=\"noopener\">noted by Howard Oakley<\/a>. (For an explanation of Apple&#8217;s usually outdated and mostly ineffective XProtect technology, see the &#8220;XProtect: Apple&#8217;s malware detection engine&#8221; section of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/#xprotect-applesmalwaredetectionengine\" target=\"_blank\" rel=\"noopener\">this article<\/a>.)<\/p>\n<h3>OSX\/Bundlore droppers may be signed and notarized<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-92241\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png\" alt=\"Notarized Mac malware\" width=\"175\" height=\"114\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1.png 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1-300x195.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1-150x98.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/09\/notarized-malware-400x260-1-305x200.png 305w\" sizes=\"(max-width: 175px) 100vw, 175px\" \/>As we have noted before, Mac malware droppers like OSX\/Bundlore are often signed with an Apple developer certificate (one developer account used in this campaign was &#8220;Eric Jeansonne (CVRCZ9H65R)&#8221;), and the droppers may even be notarized.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/notarization\/\">Notarization<\/a> is specifically supposed to identify and block new malware before it can ever infect Macs, but Apple\u2019s automated notarization process has continuously been tricked into notarizing malware samples that Apple has failed to detect as malicious. (Notarization is an automated process that does not involve any manual review by human employees at Apple. This differs from App Store submissions which must pass both automated and human inspections.)<\/p>\n<p><strong>Both code-signed and notarized samples have been observed as part of the latest Adload campaign.<\/strong> When Apple becomes aware that a developer certificate has been used to sign malware, Apple revokes the certificate, but malware makers simply purchase (or hack into) another developer account and continue to code-sign their malware to more easily avoid being blocked by macOS&#8217;s built-in defenses.<\/p>\n<p>Strangely, even though Apple had revoked a number of certificates that the malware developer had been using, <strong>Apple neglected to add detection for this malware to its XProtect definitions<\/strong> until just recently. This meant that the malware makers could simply <em>re-sign<\/em> their malware with a new developer certificate and immediately continue infecting Macs, rather than also having to <em>redesign<\/em> their malware to try to evade Apple&#8217;s XProtect detection.<\/p>\n<h3>How can one remove or prevent Adload, Bundlore, and other threats?<\/h3>\n<p>Given that Apple has frequently <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/notarization\/\">notarized<\/a> Mac malware, and Apple&#8217;s other threat mitigation features such as Gatekeeper, XProtect, and MRT do not block many types of threats, it is evident that Apple\u2019s own macOS protection methods are insufficient by themselves.<\/p>\n<p><em>Related: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"uUUzUFP39z\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Do Macs need antivirus software?&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/embed\/#?secret=uUUzUFP39z\" data-secret=\"uUUzUFP39z\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate <strong>OSX\/Adload<\/strong> and <strong>OSX\/Bundlore<\/strong>\u00a0malware.<\/p>\n<p>VirusBarrier is designed by Mac security experts, and it protects against a much wider variety of malware than Apple\u2019s mitigation methods.<\/p>\n<p>If you believe your Mac may have been infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time scanning<\/a>, such as <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">VirusBarrier X9<\/a>\u2014which also protects Macs from M1-native malware, cross-platform malware, and more. <strong>Intego recently earned a 100% detection rating for both Mac and Windows malware<\/strong> in <a href=\"https:\/\/www.av-comparatives.org\/tests\/mac-security-test-review-2021\/#intego\" target=\"_blank\" rel=\"noopener\">AV-Comparatives&#8217; third-party independent testing<\/a>.<\/p>\n<p><span style=\"font-size: small;\">Note: Intego customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected from these threats. It is best to upgrade to the latest versions of VirusBarrier and macOS, if possible, to ensure your Mac gets all the latest security updates from Apple<\/span><span style=\"font-size: small;\">.<\/span><\/p>\n<h3>Is OSX\/Adload known by any other names?<\/h3>\n<p>Other vendors&#8217; names for threats from this malware campaign may include, for the persistent infection (which Intego detects as <strong>OSX\/Adload<\/strong>), variations of: Adware.MAC.AdLoad, Adware.OSX.AdLoad, Adware.OSX.Cimpli, Adware\/Adload!OSX, Adware\/Cimpli!OSX, Downloader.Adload.OSX, MACOS.2afe6bd, MACOS.7c241b4, MacOS\/Adload, OSX\/Dldr.Adload, OSX\/Dwnldr-AASO, PUA:MacOS\/Adload, and Trojan-Downloader.OSX.Adload.<\/p>\n<p>The dropper files (which Intego detects as <strong>OSX\/Bundlore.zsh<\/strong>) are identified by other vendors under names such as: Adware.OSX.Bnodlero, Adware.OSX.Bundlore, MACOS.a9ea9b4, MACOS.ef3df25, MacOS:AdAgent, PUA:MacOS\/Bundlore, and Trojan-Downloader.OSX.Shlayer.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more technical details of the recent Adload campaign, you can read <a href=\"https:\/\/labs.sentinelone.com\/massive-new-adload-campaign-goes-entirely-undetected-by-apples-xprotect\/\" target=\"_blank\" rel=\"noopener nofollow\">Phil Stokes&#8217; write-up<\/a>.<\/p>\n<p>We discussed <strong>OSX\/Adload<\/strong> on <a href=\"https:\/\/podcast.intego.com\/204\">episode 204<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">follow the podcast<\/a> to make sure you don\u2019t miss any episodes! You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+LIpjVifQ?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.<\/p>\n","protected":false},"author":14,"featured_media":52474,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4608,86,4625,4096],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/Adload: Mac Malware Apple Missed for Many Months - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T22:32:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-24T15:31:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/\",\"name\":\"OSX\/Adload: Mac Malware Apple Missed for Many Months - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#primaryimage\"},\"datePublished\":\"2021-08-26T22:32:23+00:00\",\"dateModified\":\"2021-09-24T15:31:04+00:00\",\"description\":\"The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/Adload: Mac Malware Apple Missed for Many Months\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"OSX\/Adload: Mac Malware Apple Missed for Many Months\",\"datePublished\":\"2021-08-26T22:32:23+00:00\",\"dateModified\":\"2021-09-24T15:31:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#webpage\"},\"wordCount\":1155,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg\",\"keywords\":[\"Apple Software Notarization\",\"Malware\",\"OSX\/Adload\",\"OSX\/Bundlore\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/Adload: Mac Malware Apple Missed for Many Months - The Mac Security Blog","og_description":"The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2021-08-26T22:32:23+00:00","article_modified_time":"2021-09-24T15:31:04+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","width":400,"height":260,"caption":"Fake Flash Player installers continue to be used by OSX\/Adload and OSX\/Bundlore malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/","name":"OSX\/Adload: Mac Malware Apple Missed for Many Months - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#primaryimage"},"datePublished":"2021-08-26T22:32:23+00:00","dateModified":"2021-09-24T15:31:04+00:00","description":"The latest Adload malware had been infecting Macs for months before Apple began to detect it. Intego VirusBarrier users were already protected.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/Adload: Mac Malware Apple Missed for Many Months"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"OSX\/Adload: Mac Malware Apple Missed for Many Months","datePublished":"2021-08-26T22:32:23+00:00","dateModified":"2021-09-24T15:31:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#webpage"},"wordCount":1155,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","keywords":["Apple Software Notarization","Malware","OSX\/Adload","OSX\/Bundlore"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/fake-flash-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-owO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94290"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94290"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94290\/revisions"}],"predecessor-version":[{"id":94547,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94290\/revisions\/94547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/52474"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}