{"id":97912,"date":"2023-05-04T15:45:11","date_gmt":"2023-05-04T22:45:11","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=97912"},"modified":"2023-05-04T19:39:45","modified_gmt":"2023-05-05T02:39:45","slug":"rustbucket-apt-group-targets-macs-with-pdf-trojan-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/","title":{"rendered":"RustBucket: APT group targets Macs with PDF Trojan malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97915\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p>An advanced persistent threat (APT) group known as BlueNoroff is reportedly targeting Macs with a new malware family. BlueNoroff is believed to have ties to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/lazarus-group\/\">Lazarus Group<\/a>, which has developed a variety of Mac malware in recent years. Both APT groups seem to be aligned with the interests of the North Korean government.<\/p>\n<p>The new malware family is known as RustBucket. Keep reading to learn everything you need to know about this threat and how to keep your Mac safe.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#whatdo\">What does OSX\/RustBucket Mac malware do?<\/a>\n<ul>\n<li><a href=\"#trigger\">The evil-PDF trigger<\/a><\/li>\n<li><a href=\"#payload3\">The third-stage payload<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#how-to-remove\">How can one remove or prevent RustBucket and other Mac malware?<\/a><\/li>\n<li><a href=\"#iocs\">RustBucket indicators of compromise (IoCs)<\/a><\/li>\n<li><a href=\"#other-names\">Is RustBucket known by any other names?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"whatdo\"><\/a><\/li>\n<\/ul>\n<h3>What does OSX\/RustBucket Mac malware do?<\/h3>\n<p>To an unsuspecting user, the RustBucket Trojan horse looks like a simple PDF-reader app. It has an innocuous-looking icon, and the app&#8217;s name is \u201cInternal PDF Viewer.\u201d (Note that future variants may use a different disguise instead.)<\/p>\n<div id=\"attachment_97922\" style=\"width: 266px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-97922\" loading=\"lazy\" class=\"wp-image-97922 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/BlueNoroff-OSX-RustBucket-NukeSped-Internal-PDF-Viewer-Trojan-horse-malware-icon.png\" alt=\"\" width=\"256\" height=\"256\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/BlueNoroff-OSX-RustBucket-NukeSped-Internal-PDF-Viewer-Trojan-horse-malware-icon.png 256w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/BlueNoroff-OSX-RustBucket-NukeSped-Internal-PDF-Viewer-Trojan-horse-malware-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/BlueNoroff-OSX-RustBucket-NukeSped-Internal-PDF-Viewer-Trojan-horse-malware-icon-120x120.png 120w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/><p id=\"caption-attachment-97922\" class=\"wp-caption-text\">OSX\/RustBucket&#8217;s &#8220;Internal PDF Viewer&#8221; Trojan horse app icon.<\/p><\/div>\n<p>RustBucket&#8217;s first-stage Trojan is a simple AppleScript app that runs a few shell scripts. These scripts download, unzip, and run a second-stage payload, written in Objective-C.<\/p>\n<p>That second payload is a basic PDF reader app. Yes, you can actually open any standard PDF with it. However, &#8220;Internal PDF Viewer&#8221; has some secret functionality as well.<a name=\"trigger\"><\/a><\/p>\n<h4><strong>The evil-PDF trigger<\/strong><\/h4>\n<p>As the name hints, &#8220;Internal PDF Viewer&#8221; is designed to read particular PDF files. But in reality, the app doesn&#8217;t let you view proprietary PDFs intended exclusively for the eyes of a particular company&#8217;s employees.<\/p>\n<p>Instead, opening a maliciously crafted PDF file triggers additional behavior, causing the app to phone home to a command-and-control (C&amp;C or C2) server.<a name=\"payload3\"><\/a><\/p>\n<h4><strong>The third-stage payload<\/strong><\/h4>\n<p>At this point, the app attempts to download an additional payload or receive further instructions from the server. However, by the time the malware was discovered, the server was not responding to the phone-home URL as expected. This seems to imply that the goals of that particular variant&#8217;s campaign might have already been achieved. It seemed that the server operators had voluntarily shut down the C&amp;C functionality at that particular URL.<\/p>\n<p>However, researchers discovered another URL on the same server that hosted what may have been the third-stage malware payload. This payload was written in Rust (hence the malware&#8217;s nickname, RustBucket).<\/p>\n<p>Researchers are still investigating the functionality of this last payload. But based on the APT group&#8217;s past activity, BlueNoroff&#8217;s RustBucket malware would likely attempt to steal cryptocurrency. It may also attempt to exfiltrate other sensitive or proprietary information to the North Korea-linked threat group.<a name=\"how-to-remove\"><\/a><\/p>\n<h3>How can one remove or prevent RustBucket and other Mac malware?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/p>\n<p>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate this Mac malware. Intego products detect components of this threat as <strong>OSX\/RustBucket<\/strong> or variations of <strong>trojan:OSX\/Nukesped<\/strong>.<\/p>\n<p>If you believe your Mac may be infected\u2014or to prevent future infections\u2014use trusted antivirus software. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It&#8217;s compatible with a variety of Mac hardware and OS versions, including the latest Apple silicon Macs running macOS Ventura.<\/p>\n<p>Additionally, if you use a Windows PC, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from PC malware.<\/p>\n<p><span style=\"font-size: small;\">VirusBarrier X6, X7, and X8 on older Mac OS X versions also provide protection. Note, however, that it is best to upgrade to the latest versions of macOS and VirusBarrier; this will help ensure your Mac gets all the latest security updates from Apple.<a name=\"iocs\"><\/a><\/span><\/p>\n<h3>RustBucket indicators of compromise (IoCs)<\/h3>\n<p>This file path is associated with RustBucket malware:<\/p>\n<pre>\/Users\/Shared\/Internal PDF Viewer.app<\/pre>\n<p>The following SHA-256 hashes relate to RustBucket-related malware campaigns:<\/p>\n<pre>014692bbe2d289563f67a922d12c9c0af290e6c8b1a473418d705b2022868b5f*\r\n07d206664a8d397273e69ce37ef7cf933c22e93b62d95b673d6e835876feba06\r\n0d6964fe763c2e6404cde68af2c5f86d34cf50a88bd81bc06bba739010821db0\r\n123543c7a5523a15a933e32477b8cba4cd79a680bb69ef2dba178700bfb9ec07\r\n30025e57c68c37337cb00600c851bbcba75723e4fadf960a572176c94aa7f2e2*\r\n38106b043ede31a66596299f17254d3f23cbe1f983674bf9ead5006e0f0bf880\r\n3b6f30369a4ee8bf9409d141b6d1b3fb4286c34984b5de005ed7431df549b17e\r\n3d41cd5199dbd6cefcc78d53bb44a2ecbea716de2bc8e547ead7c2aebd9925f0\r\n7981ebf35b5eff8be2f3849c8f3085b9cec10d9759ff4d3afd46990520de0407\r\n7c66d2d75be43d2c17e75d37c39344a9b5d29ee5c5861f178aa7d9f34208eb48\r\n7e2b38decf1f826fbb792d762d9e6a29147e9ecb44eb2ad2c4dc08e7ee01a140\r\n8e234482db790fa0a3d2bf5f7084ec4cfb74bffd5f6cbdc5abdbc1350f58e3fe\r\n9525f5081a5a7ab7d35cf2fb2d7524e0777e37fe3df62730e1e7de50506850f7\r\n9ca914b1cfa8c0ba021b9e00bda71f36cad132f27cf16bda6d937badee66c747\r\nb448381f244dc0072abd4f52e01ca93efaebb2c0a8ea8901c4725ecb1b2b0656\r\nb68bf400a23b1053f54911a2b826d341f6bf87c26bea5e6cf21710ee569a7aab*\r\nbea33fb3205319868784c028418411ee796d6ee3dfe9309f143e7e8106116a49\r\nc56a97efd6d3470e14193ac9e194fa46d495e3dddc918219cca530b90f01d11e\r\ne74e8cdf887ae2de25590c55cb52dad66f0135ad4a1df224155f772554ea970c\r\nea5fac3201a09c3c5c3701723ea9a5fec8bbc4f1f236463d651303f40a245452\r\nff8832355ae99ffd66d0fe9eda2d74efdf3ed87bb2a4c215b93ade93165f7c0b\r\n*First reported by Intego<\/pre>\n<p>These command-and-control (C&amp;C) domains and IP address have been used in conjunction with this malware:<\/p>\n<pre>cloud.dnx[.]capital\r\ndeck.31ventures[.]info\r\nlaos.hedgehogvc[.]us\r\n104.255.172[.]56<\/pre>\n<p>Network administrators can check recent network traffic logs to try to identify whether any computers on their network may have attempted to contact these domains or IP, which could indicate a possible infection.<a name=\"other-names\"><\/a><\/p>\n<h3>Is RustBucket known by any other names?<\/h3>\n<p>Other vendors&#8217; names for threat components related to this malware campaign may include variations of the following, among others:<\/p>\n<p><span style=\"font-size: small;\">Backdoor (0040f37a1), BIN.S.Agent.1144, HEUR_PDFEXP.E, HEUR:Trojan-Downloader.OSX.Lazarus.d, HEUR:Trojan-Downloader.OSX.Lazarus.e, HEUR:Trojan-Downloader.OSX.Lazarus.gen, IOS\/Nukesped.E, MAC\/NukeSpeed.E, MacOS:Nukesped-A [Drp], MacOS:NukeSpeed-AC [Trj], MacOS:NukeSpeed-AD [Trj], MacOS\/Nukesped.E, Malware.OSX\/NukeSped.kdvjc, Malware.OSX\/NukeSped.mwfxa, Malware.OSX\/NukeSped.xtyyy, Malware.OSX\/NukeSped.xtyzd, Osx.Trojan-Downloader.Lazarus.Cdhl, Osx.Trojan-Downloader.Lazarus.Lzfl, OSX.Trojan.Gen, Osx.Trojan.Nukesped.Rnkl, OSX\/NukeSped-AV, OSX\/NukeSped.kdvjc, OSX\/NukeSped.mwfxa, OSX\/NukeSped.R, OSX\/NukeSped.R!tr, OSX\/NukeSped.S, OSX\/NukeSped.xtyyy, OSX\/NukeSped.xtyzd, PDF.Z.Agent.1921288, PDF\/Agent.AV, PDF\/Agent.AW, PDF\/Agent.AX, PDF\/Agent.C6C7!tr, PDF\/Agent5.D, PDF\/BlueNoroff, TROJ_FRS.0NA103DP23, TROJ_FRS.0NA103DS23, TROJ_FRS.VSNTE123, Trojan-Downloader.OSX.Lazarus.c, Trojan-NukeSped.g, Trojan:MacOS\/NukeSped.H, Trojan:PDF\/Phish!MSR, Trojan.DownLoader45.55021, Trojan.Generic.33556067, Trojan.Generic.D2000663, Trojan.Generic.D3F9EE60, Trojan.Generic.D3FA0EC6, Trojan.Generic.D3FA0ECC, Trojan.Generic.D3FA0F15, Trojan.GenericKD.66711136, Trojan.GenericKD.66719430, Trojan.GenericKD.66719436, Trojan.GenericKD.66719509, Trojan.MAC.Generic.111990, Trojan.MAC.Generic.D1B576, Trojan.MAC.Lazarus.O, Trojan.MAC.Lazarus.P, Trojan.MAC.Lazarus.Q, Trojan.MAC.Lazarus.R, Trojan.MAC.Lazarus.S, Trojan.MacOS.NUKESPED.VSNW1AD23, Trojan.MacOS.S.Agent.103440, Trojan.None.Lazarus.4!c, Trojan.OSX.Lazarus.4!c, Trojan.OSX.Nukesped, Trojan.PDF.Agent, Trojan.ZIP.Lazarus.4!c, Trojan\/OSX.NukeSped.103440, Trojan\/OSX.NukeSped.1144, Trojan\/OSX.NukeSped.11843410, Trojan\/OSX.NukeSped.215488, Trojan\/OSX.NukeSped.573999, Trojan\/OSX.NukeSped.578196, Trojan\/OSX.NukeSped.589304, Trojan\/OSX.NukeSped.590536, Trojan\/OSX.NukeSped.601670, Trojan\/OSX.NukeSped.84416, Trojan\/PDF.Agent, TrojanDownloader:MacOS\/Lazarus.23ba746b, TrojanDownloader:MacOS\/Lazarus.8440ead7, TrojanDownloader:MacOS\/Lazarus.c591a120<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional technical details about how RustBucket functions, see the <a href=\"https:\/\/www.jamf.com\/blog\/bluenoroff-apt-targets-macos-rustbucket-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">original report<\/a> by Ferdous Saljooki and Jaron Bradley. The pair credited <a href=\"https:\/\/twitter.com\/patrickwardle\" target=\"_blank\" rel=\"noopener\">Patrick Wardle<\/a> for assisting them with their analysis.<\/p>\n<p>We also acknowledge <a href=\"https:\/\/twitter.com\/k3yp0d\/status\/1650071119074844673\" target=\"_blank\" rel=\"noopener\">Simon Kenin<\/a> and <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1650742442096730112\" target=\"_blank\" rel=\"noopener\">MalwareHunterTeam<\/a>, who independently discovered some of the same samples and domains as Intego&#8217;s researcher team.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes. You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.<\/p>\n","protected":false},"author":14,"featured_media":97915,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4291,4288,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RustBucket: APT group targets Macs with PDF Trojan malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-04T22:45:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-05T02:39:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg\",\"width\":600,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/\",\"name\":\"RustBucket: APT group targets Macs with PDF Trojan malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#primaryimage\"},\"datePublished\":\"2023-05-04T22:45:11+00:00\",\"dateModified\":\"2023-05-05T02:39:45+00:00\",\"description\":\"An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RustBucket: APT group targets Macs with PDF Trojan malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"RustBucket: APT group targets Macs with PDF Trojan malware\",\"datePublished\":\"2023-05-04T22:45:11+00:00\",\"dateModified\":\"2023-05-05T02:39:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#webpage\"},\"wordCount\":1142,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg\",\"keywords\":[\"Advanced Persistent Threats (APT)\",\"Lazarus Group\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/","og_locale":"en_US","og_type":"article","og_title":"RustBucket: APT group targets Macs with PDF Trojan malware - The Mac Security Blog","og_description":"An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-05-04T22:45:11+00:00","article_modified_time":"2023-05-05T02:39:45+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg","width":600,"height":400},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/","name":"RustBucket: APT group targets Macs with PDF Trojan malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#primaryimage"},"datePublished":"2023-05-04T22:45:11+00:00","dateModified":"2023-05-05T02:39:45+00:00","description":"An APT group known as BlueNoroff, which has ties with Lazarus Group, is targeting Macs with a fake PDF viewer Trojan horse. Here is everything you need to know about this macOS malware.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"RustBucket: APT group targets Macs with PDF Trojan malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"RustBucket: APT group targets Macs with PDF Trojan malware","datePublished":"2023-05-04T22:45:11+00:00","dateModified":"2023-05-05T02:39:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#webpage"},"wordCount":1142,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg","keywords":["Advanced Persistent Threats (APT)","Lazarus Group","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/rustbucket-apt-group-targets-macs-with-pdf-trojan-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Rust-Bucket-Mac-malware-logo-600x400-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pte","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97912"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=97912"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97912\/revisions"}],"predecessor-version":[{"id":97945,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97912\/revisions\/97945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97915"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=97912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=97912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=97912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}