	{"id":95160,"date":"2022-01-13T15:12:22","date_gmt":"2022-01-13T23:12:22","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95160"},"modified":"2023-01-26T03:59:13","modified_gmt":"2023-01-26T11:59:13","slug":"sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/","title":{"rendered":"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-95174\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-600x300-1.jpg\" alt=\"SysJoker malware logo\" width=\"600\" height=\"300\" \/><\/p>\n<p>SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware\u2014it&#8217;s cross-platform malware that can also infect PCs running Windows or Linux.<\/p>\n<p>Intego detects this malware&#8217;s various components as <strong>OSX\/SysJoker.gen<\/strong>, <strong>OSX\/SysJoker.lct<\/strong>, <strong>Linux\/SysJoker.A<\/strong>, and <strong>Win32\/SysJoker.A<\/strong>.<\/p>\n<p>Let&#8217;s examine this new threat and what makes it unique.<\/p>\n<h3>How was SysJoker discovered?<\/h3>\n<p>According to <a href=\"https:\/\/www.intezer.com\/blog\/incident-response\/new-backdoor-sysjoker\/\" target=\"_blank\" rel=\"noopener nofollow\">Intezer<\/a>, SysJoker &#8220;was first discovered during an active attack on a Linux-based web server of a leading educational institution.&#8221; Mac and Windows variants were found layer. Although the malware was discovered in December 2021, it may have been deployed sometime earlier in the second half of the year.<\/p>\n<h3>What does SysJoker do to an infected computer?<\/h3>\n<p>SysJoker pretends to be an operating system update mechanism. In reality, though, it has been observed to collect specific information about the infected computer, such as the MAC address, user name, and IP address. Thus its primary goal appears to be espionage, or in other words, spying on the victim.<\/p>\n<p>The initial macOS SysJoker component is named <code>types-config.ts<\/code>, masquerading as either a <a href=\"https:\/\/en.wikipedia.org\/wiki\/TypeScript\" target=\"_blank\" rel=\"noopener\">TypeScript<\/a> or <a href=\"https:\/\/en.wikipedia.org\/wiki\/MPEG_transport_stream\" target=\"_blank\" rel=\"noopener\">MPEG transport stream<\/a> video file. However, the file is actually a universal <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mach-O\" target=\"_blank\" rel=\"noopener\">Mach-O<\/a> binary, meaning that it&#8217;s designed to infect Macs with either an Intel or Apple Silicon (e.g. M1) processor.<\/p>\n<p>The malware has methods of persistence, meaning it can continue to actively infect a computer after a reboot. Because it communicates with a command and control (C&amp;C) server, it&#8217;s possible for the malware to receive additional instructions\u2014and download additional components and upgrade its capabilities\u2014at any time.<\/p>\n<h3>How can one remove or prevent SysJoker and other threats?<\/h3>\n<p>Unfortunately, the threat mitigation features that Apple has built into macOS\u2014such as notarization, Gatekeeper, XProtect, and MRT\u2014do not block many types of threats. Thus, Apple\u2019s own macOS protection methods are insufficient by themselves.<\/p>\n<p><em>Related: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"zz2hJjLIW7\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Do Macs need antivirus software?&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/embed\/#?secret=zz2hJjLIW7\" data-secret=\"zz2hJjLIW7\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate SysJoker malware. VirusBarrier is designed by Mac security experts, and it protects against a much wider variety of malware than Apple\u2019s mitigation methods.<\/p>\n<p>If you believe your Mac may have been infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time scanning<\/a>, such as <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego VirusBarrier X9<\/a>\u2014which also protects Macs from M1-native malware, cross-platform malware, and more. <strong>Intego recently earned a 100% detection rating for Mac malware<\/strong> in two independent tests conducted by <a href=\"https:\/\/www.av-comparatives.org\/tests\/mac-security-test-review-2021\/#intego\" target=\"_blank\" rel=\"noopener\">AV-Comparatives<\/a> and <a href=\"https:\/\/www.av-test.org\/en\/antivirus\/home-macos\/macos-bigsur\/june-2021\/intego-virusbarrier-10.9-215205\/\" target=\"_blank\" rel=\"noopener\">AV-TEST<\/a>.<\/p>\n<p>And if you&#8217;re a Windows user, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can protect your PC from SysJoker, too.<\/p>\n<p><span style=\"font-size: small;\">Note: Intego customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected from these threats. It is best to upgrade to the latest versions of VirusBarrier and macOS, if possible, to ensure your Mac gets all the latest security updates from Apple<\/span><span style=\"font-size: small;\">.<\/span><\/p>\n<h3>What can we learn from the domains used by SysJoker?<\/h3>\n<p>As noted by Patrick Wardle, the domain <code>graphic-updater[.]com<\/code> \u2014 which the malware appears to use as a C&amp;C server \u2014 resolves to the IP address <code>23.254.131[.]176<\/code>.\u00a0 As of Tuesday, accessing this IP address via a browser would display a list of files hosted on a Web server:<\/p>\n<div id=\"attachment_95169\" style=\"width: 533px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-95169\" loading=\"lazy\" class=\"size-full wp-image-95169\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-CC-server.png\" alt=\"\" width=\"523\" height=\"816\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-CC-server.png 523w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-CC-server-192x300.png 192w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-CC-server-96x150.png 96w\" sizes=\"(max-width: 523px) 100vw, 523px\" \/><p id=\"caption-attachment-95169\" class=\"wp-caption-text\">Was this SysJoker&#8217;s C&amp;C server? Image: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x6C.html\" target=\"_blank\" rel=\"noopener\">Wardle<\/a><\/p><\/div>\n<p>Interestingly, it appears that the version of Apache running on this server was 2.4.41. This Apache version was originally released in August 2019 and contains numerous known vulnerabilities. It&#8217;s therefore plausible that the malware maker or distributor may have hacked into someone else&#8217;s server and hijacked it to use as their C&amp;C server.<\/p>\n<p>As of Thursday, the HTTP server hosted at this IP address appears to be offline. Additionally, the server <code>github[.]url-mini[.]com<\/code> that had been hosting Windows malware appears to be offline now, and Google appears to have removed the two C&amp;C-related text files from Google Drive.<\/p>\n<h3>Indicators of compromise (IoCs)<\/h3>\n<p>Unlike most Mac malware, this malware is not signed using an Apple-issued Developer ID. Rather, the <code>types-config.ts<\/code> file uses an ad-hoc signature with the identifier <code>test-555549448174817ef4cf398d975b7860466eaec7<\/code>.<\/p>\n<p>The following SHA-256 file hashes belong to known SysJoker files associated with this malware campaign:<\/p>\n<pre>1a9a5c797777f37463b44de2b49a7f95abca786db3977dcdac0f79da739c08ac  macOS\r\na26c69d3221eaca93eb29f3c7b67bcccbaca18595211efd8a73324f0519e51e3* macOS\r\nbd0141e88a0d56b508bc52db4dab68a49b6027a486e4d9514ec0db006fe71eed  Linux\r\nd028e64bf4ec97dfd655ccd1157a5b96515d461a710231ac8a529d7bdb936ff3  Linux\r\n1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c  Windows\r\n61df74731fbe1eafb2eb987f20e5226962eeceef010164e41ea6c4494a4010fc  Windows\r\n*hash first reported by Intego<\/pre>\n<p>The following files and folders may potentially be found on an infected Mac:<\/p>\n<pre>\/Library\/LaunchAgents\/com.apple.update.plist\r\n\/Library\/MacOsServices\r\n\/Library\/MacOsServices\/updateMacOs\r\n\/Library\/SystemNetwork\r\n~\/Library\/LaunchAgents\/com.apple.update.plist\r\n~\/Library\/MacOsServices\r\n~\/Library\/MacOsServices\/updateMacOs\r\n~\/Library\/SystemNetwork<\/pre>\n<p>Note that <code>~<\/code> denotes the user&#8217;s home folder, e.g. <code>\/Users\/username<\/code>.<\/p>\n<p>The following domains, IP address, and files hosted on Google Drive have been observed to have ties with this malware. Network administrators can check logs to try to identify whether any computers on their network may have attempted to contact one of these sites between December 2021 and today.<\/p>\n<pre>23.254.131[.]176\r\nbookitlab[.]tech\r\ngithub[.]url-mini[.]com\r\ngraphic-updater[.]com\r\noffice360-update[.]com\r\nwinaudio-tools[.]com\r\ndrive[.]google[.]com\/uc?export=download&amp;id=1-NVty4YX0dPHdxkgMrbdCldQCpCaE-Hn\r\ndrive[.]google[.]com\/uc?export=download&amp;id=1W64PQQxrwY3XjBnv_QAeBQu-ePr537eu<\/pre>\n<h3>Is SysJoker known by any other names?<\/h3>\n<p>Other vendors&#8217; names for threat components from this malware campaign may include variations of: Backdoor:MacOS\/SysJoker.A, Backdoor.Linux.SYSJOKER.YXCALZ, Backdoor.OSX.SysJoker.gen, Backdoor.SysJoker!1.DB62, Backdoor\/OSX.Agent.360176, Backdoor\/W32.SysJocker, BehavesLike.Win32.Vundo.ch, BScope.Trojan.Occamy, E64\/SysJoker.A, ELF:Joker-A [Trj], Linux.BackDoor.SysJoker, LINUX\/Agent.roatu, LINUX\/Agent.xbpol, Linux\/SysJoker.A!tr, Linux\/SysJokr-A, Mac.BackDoor.SysJoker.1, MacOS:Joker-A [Trj], MacOS\/SysJoker.A, Mal\/Generic-S + Troj\/DwnLd-VP, Mal\/Generic-S + Troj\/Steal-CFG, Osx.Backdoor.Sysjoker.Ahog, OSX.S.Agent.360176, OSX\/SysJoker.A!tr, RDN\/Sysjoker, TR\/Dldr.Agent.rukwx, TR\/Redcap.rjsiq, Trj\/GdSda.A, TROJ_FRS.VSNTAC22, Trojan-Downloader.SysJoker, Trojan:Linux\/Vigorf.A, Trojan:Win32\/Casdet!rfn, Trojan.Agent.SysJocker, Trojan.Linux.OUTBREAK.USELVAC22, Trojan.Linux.SysJoker.B, Trojan.MAC.SysJoker.A, Trojan.OSX.Agent, Trojan.OSX.SysJoker.m!c, Trojan.Win32.Sysjoker, W32.Trojan.Sysjoker, and Win32\/SysJoker.A.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional technical details about the SysJoker malware, you can read <a href=\"https:\/\/www.intezer.com\/blog\/malware-analysis\/new-backdoor-sysjoker\/\" target=\"_blank\" rel=\"noopener nofollow\">Intezer&#8217;s<\/a> and <a href=\"https:\/\/objective-see.com\/blog\/blog_0x6C.html\" target=\"_blank\" rel=\"noopener nofollow\">Patrick Wardle&#8217;s<\/a> write-ups.<\/p>\n<p>We discussed SysJoker on <a href=\"https:\/\/podcast.intego.com\/222\">episode 222<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">follow the podcast<\/a> to make sure you don\u2019t miss any episodes! You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+tW6_a9hd?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p><span style=\"font-size: x-small;\">SysJoker logo images based on: &#8220;<a href=\"https:\/\/www.flickr.com\/photos\/83670821@N04\/7759264414\" target=\"_blank\" rel=\"noopener noreferrer\">Jester- Joker Card<\/a>&#8221; by GoShows (<a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\" target=\"_blank\" rel=\"noopener noreferrer\">CC BY 2.0<\/a>) and &#8220;<a href=\"https:\/\/www.flickr.com\/photos\/60057912@N00\/5508849065\" target=\"_blank\" rel=\"noopener noreferrer\">Matrix &#8211; iPhone Background<\/a>&#8221; by Patrick Hoesly (CC BY 2.0); both images modified.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware\u2014it&#8217;s cross-platform malware that can also infect PCs running Windows or Linux. Intego detects this malware&#8217;s various components as OSX\/SysJoker.gen, OSX\/SysJoker.lct, Linux\/SysJoker.A, and Win32\/SysJoker.A. Let&#8217;s examine this new threat and what makes it unique. How was SysJoker discovered? [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":95173,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware; it is cross-platform backdoor malware that can also infect PCs running Windows or Linux.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware; it is cross-platform backdoor malware that can also infect PCs running Windows or Linux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T23:12:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-26T11:59:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"SysJoker logo - Jester by GoShows https:\/\/www.flickr.com\/photos\/83670821@N04\/7759264414 and Matrix by Patrick Hoesly https:\/\/www.flickr.com\/photos\/60057912@N00\/5508849065\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/\",\"name\":\"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#primaryimage\"},\"datePublished\":\"2022-01-13T23:12:22+00:00\",\"dateModified\":\"2023-01-26T11:59:13+00:00\",\"description\":\"SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware; it is cross-platform backdoor malware that can also infect PCs running Windows or Linux.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux\",\"datePublished\":\"2022-01-13T23:12:22+00:00\",\"dateModified\":\"2023-01-26T11:59:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#webpage\"},\"wordCount\":1078,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg\",\"keywords\":[\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware; it is cross-platform backdoor malware that can also infect PCs running Windows or Linux.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/","og_locale":"en_US","og_type":"article","og_title":"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux - The Mac Security Blog","og_description":"SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware; it is cross-platform backdoor malware that can also infect PCs running Windows or Linux.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2022-01-13T23:12:22+00:00","article_modified_time":"2023-01-26T11:59:13+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg","width":400,"height":260,"caption":"SysJoker logo - Jester by GoShows https:\/\/www.flickr.com\/photos\/83670821@N04\/7759264414 and Matrix by Patrick Hoesly https:\/\/www.flickr.com\/photos\/60057912@N00\/5508849065"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/","name":"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#primaryimage"},"datePublished":"2022-01-13T23:12:22+00:00","dateModified":"2023-01-26T11:59:13+00:00","description":"SysJoker is one of the most recently discovered Mac malware families. But SysJoker is not just Mac malware; it is cross-platform backdoor malware that can also infect PCs running Windows or Linux.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"SysJoker: Cross-Platform Backdoor Malware for Mac, Windows, and Linux","datePublished":"2022-01-13T23:12:22+00:00","dateModified":"2023-01-26T11:59:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#webpage"},"wordCount":1078,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg","keywords":["Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/01\/SysJoker-malware-logo-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oKQ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95160"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95160"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95160\/revisions"}],"predecessor-version":[{"id":97007,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95160\/revisions\/97007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/95173"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}