	{"id":96364,"date":"2022-10-20T12:13:32","date_gmt":"2022-10-20T19:13:32","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96364"},"modified":"2022-10-23T22:44:21","modified_gmt":"2022-10-24T05:44:21","slug":"malware-attack-framework-alchimist-designed-to-exploit-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/","title":{"rendered":"Malware Attack Framework &#8220;Alchimist&#8221; Designed to Exploit Macs"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-92418\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero.jpeg\" alt=\"\" width=\"2252\" height=\"1044\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero.jpeg 2252w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-300x139.jpeg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-1024x475.jpeg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-150x70.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-768x356.jpeg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-1536x712.jpeg 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-2048x949.jpeg 2048w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/mac-malware-hero-657x305.jpeg 657w\" sizes=\"(max-width: 2252px) 100vw, 2252px\" \/><\/p>\n<p>Researchers recently discovered a new malware attack framework known as Alchimist. Threat actors use Alchimist to infect and remotely control macOS, Linux, and Windows computers. <strong>It is likely to have been used in the wild.<\/strong><\/p>\n<p>Interestingly, Alchimist was discovered alongside a malicious Mac app designed to exploit a known vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-4034\">CVE-2021-3034<\/a>) in Polkit pkexec, a command-line utility that allows an authorized user to execute an app as though they were another user.<\/p>\n<p>The vulnerability\u2014nicknamed PwnKit, a play on the name Polkit\u2014can be exploited to allow an attacker to gain local privilege escalation. This means that the attacker could run commands or malicious software with full administrative rights. The pkexec flaw went undetected for more than twelve years before researchers discovered it in November 2021.<\/p>\n<p>Although the pkexec utility is included by default with every major Linux distribution, Apple doesn&#8217;t include it with Mac operating systems. Therefore it isn&#8217;t entirely clear why the Alchimist developers designed Mac malware to exploit a vulnerability in a utility that isn&#8217;t included with macOS. Perhaps the malware makers hoped to install pkexec and then exploit it on targeted Macs, or perhaps they were targeting someone known to use pkexec on Macs.<\/p>\n<h3>How can one remove or prevent Alchimist-related malware?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate malware and exploits associated with the Alchimist framework.<\/p>\n<p>If you believe your Mac may have been infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier\u00a0is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s upcoming Mac operating system, macOS Ventura.<\/p>\n<p>If you&#8217;re a Windows user, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can protect your PC from Alchimist-related threats as well.<a name=\"about-domains\"><\/a><\/p>\n<h3>Is Alchimist known by any other names?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego VirusBarrier<\/a> and <a href=\"https:\/\/www.intego.com\/intego-antivirus\">Intego Antivirus for Windows<\/a> detect this malware and related components as backdoor\/BDS\/Agent.ekgi, OSX\/CVE-2021-4034, OSX\/OSX.CVE.beswh, OSX\/OSX.CVE.ykpzz, trojan\/TR\/Batch.A, trojan\/TR\/Redcap.flcv, trojan\/TR\/Rozena.57446, virus\/HTML\/ExpKit.Gen, virus\/LINUX\/Agent.cpde, virus\/LINUX\/Agent.faqs, virus\/LINUX\/Agent.F, virus\/LINUX\/Agent.gzsh, virus\/LINUX\/Agent.igtr, virus\/LINUX\/Agent.jktr, virus\/LINUX\/Agent.jnxv, virus\/LINUX\/Agent.vzom, and virus\/LINUX\/Dldr.Agent.csjv.<\/p>\n<p>Other vendors may also use the malware family names Insekt, EternalBlue, or Reshel for various components.<\/p>\n<h3>Indicators of compromise (IoCs)<\/h3>\n<p>The following SHA-256 hashes belong to known files associated with Alchimist and related malware campaigns:<\/p>\n<pre>0c25a05bdddc144fbf1ffa29372481b50ec6464592fdfb7dec95d9e1c6101d0d\r\n21774b77bbf7739178beefe647e7ec757b08367c2a2db6b5bbc0d2982310ef12\r\n2da9a09a14c52e3f3d8468af24607602cca13bc579af958be9e918d736418660\r\n2f4ef5da60db676272ad102ce0ce7d96f63449400e831a2c6861cf3e61846785\r\n3329dc95c8c3a8e4f527eda15d64d56b3907f231343e97cfe4b29b51d803e270\r\n3b37dacfaf4f246105b399aa44700965931d6605b8e609feeb511050fc747a0b\r\n43a749766b780004527b34b3816031c204b31e8dea67af0a7a05073ff1811046\r\n4837be90842f915e146bf87723e38cc0533732ba1a243462417c13efdb732dcb\r\n56ca5d07fa2e8004a008222a999a97a6c27054b510e8dd6bd22048b084079e37\r\n574467b68ba2c59327d79dfc12e58577d802e25a292af3b3b1e327858a978e4a\r\n57e4b180fd559f15b59c43fb3335bd59435d4d76c4676e51a06c6b257ce67fb2\r\nae9f370c89f0191492ed9c17a224d9c41778b47ca2768f732b4de6ee7d0d1459\r\nb44105e3a480e55ac0d8770074e3af92307d172b050beb7542a1022976f8e5a2\r\nc9ec5cc0165d1b84fcb767359cf05c30bd227c1f76fbd5855a1286371c08c320\r\nca72fa64ed0a9c22d341a557c6e7c1b6a7264b0c4de0b6f717dd44bddf550bca\r\nd80fb2c0fb95f79ab7b356b9e3b33a0553e0e5240372620e87e5be445c5586f8\r\nd94fa98977a9f23b38d6956aa2bf293cf3f44d1d24fd13a8789ab5bf3e95f560\r\nec8617cc24edd3d87a5f5b4ae14e2940e493e4cc8e0a7c28e46012481ca58080\r\ned487be94bb2a1bc861d9b2871c71aa56dc87f157d4bf88aff02f0054f9bbd41\r\nef130f1941077ffe383fe90e241620dde771cd0dd496dad29d2048d5fc478faf<\/pre>\n<p>The following IP addresses appear to have had ties with this malware or related campaigns.<\/p>\n<pre>3.86.255[.]88\r\n45.32.132[.]166\r\n95.179.246[.]73\r\n149.28.36[.]160\r\n149.28.54[.]212\r\n<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers on their network may have attempted to contact one of these IPs, which could indicate a possible infection.<a name=\"learn-more\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional technical details about the Alchimist attack framework and its use in recent malware campaigns, you can read the recent write-up by <a href=\"https:\/\/blog.talosintelligence.com\/2022\/10\/alchimist-offensive-framework.html\" target=\"_blank\" rel=\"noopener nofollow\">C. Raghuprasad, A. Malhotra, V. Ventura, with M. Thaxton<\/a>.<\/p>\n<p>We discussed Alchimist briefly on <a href=\"https:\/\/podcast.intego.com\/262\">episode 262<\/a>\u00a0of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">follow the podcast<\/a> to make sure you don\u2019t miss any episodes!<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+rQ_PAPJo?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.<\/p>\n","protected":false},"author":14,"featured_media":96367,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[52,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Attack Framework &quot;Alchimist&quot; Designed to Exploit Macs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T19:13:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-24T05:44:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/\",\"name\":\"Malware Attack Framework \\\"Alchimist\\\" Designed to Exploit Macs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#primaryimage\"},\"datePublished\":\"2022-10-20T19:13:32+00:00\",\"dateModified\":\"2022-10-24T05:44:21+00:00\",\"description\":\"A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Attack Framework &#8220;Alchimist&#8221; Designed to Exploit Macs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Malware Attack Framework &#8220;Alchimist&#8221; Designed to Exploit Macs\",\"datePublished\":\"2022-10-20T19:13:32+00:00\",\"dateModified\":\"2022-10-24T05:44:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#webpage\"},\"wordCount\":586,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg\",\"keywords\":[\"Exploit\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/","og_locale":"en_US","og_type":"article","og_title":"Malware Attack Framework \"Alchimist\" Designed to Exploit Macs - The Mac Security Blog","og_description":"A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2022-10-20T19:13:32+00:00","article_modified_time":"2022-10-24T05:44:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg","width":400,"height":260,"caption":"Mac malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/","name":"Malware Attack Framework \"Alchimist\" Designed to Exploit Macs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#primaryimage"},"datePublished":"2022-10-20T19:13:32+00:00","dateModified":"2022-10-24T05:44:21+00:00","description":"A new malware attack framework, Alchimist, can be used to infect and remotely control macOS, Linux, and Windows computers. It is likely to have been used in the wild.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Attack Framework &#8220;Alchimist&#8221; Designed to Exploit Macs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Malware Attack Framework &#8220;Alchimist&#8221; Designed to Exploit Macs","datePublished":"2022-10-20T19:13:32+00:00","dateModified":"2022-10-24T05:44:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#webpage"},"wordCount":586,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg","keywords":["Exploit","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/malware-attack-framework-alchimist-designed-to-exploit-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/mac-malware-hero-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p4g","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96364"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96364"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96364\/revisions"}],"predecessor-version":[{"id":96394,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96364\/revisions\/96394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/96367"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}