	{"id":98355,"date":"2023-06-23T18:17:40","date_gmt":"2023-06-24T01:17:40","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98355"},"modified":"2023-08-12T11:45:32","modified_gmt":"2023-08-12T18:45:32","slug":"jokerspy-backdoor-mac-malware-discovered-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/","title":{"rendered":"JokerSpy backdoor Mac malware discovered in the wild"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"wp-image-98358 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware&#8217;s early stages includes a cross-platform component, hinting that variants of JokerSpy may also exist for Windows and Linux as well.<\/p>\n<p>Let&#8217;s explore what you need to know about this new Mac threat and how to stay protected.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#whatdo\">What does JokerSpy Mac malware do?<\/a><\/li>\n<li><a href=\"#how-to-remove\">How can one remove or prevent JokerSpy and other Mac malware?<\/a><\/li>\n<li><a href=\"#whodunit\">Is JokerSpy related to SysJoker?<\/a><\/li>\n<li><a href=\"#iocs\">JokerSpy indicators of compromise (IoCs)<\/a><\/li>\n<li><a href=\"#other-names\">Is JokerSpy known by any other names?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"whatdo\"><\/a><\/li>\n<\/ul>\n<h3>What does JokerSpy Mac malware do?<\/h3>\n<p>Currently the initial infection vector (i.e. how the malware gets onto a Mac) is unknown.<\/p>\n<p>Once deployed, the earliest known stage of the malware is a Python backdoor (filename <code>sh.py<\/code>) that can be used to download additional components. On one infected system at a &#8220;prominent Japanese cryptocurrency exchange,&#8221; the malware was seen downloading SwiftBelt to gain additional capabilities. <a href=\"https:\/\/github.com\/cedowens\/SwiftBelt\" target=\"_blank\" rel=\"noopener\">SwiftBelt<\/a> is a legitimate red-teaming tool developed by Cedric Owens, a Mac-focused offensive security engineer. Unfortunately, bad guys like JokerSpy&#8217;s distributors can use good guys&#8217; tools for malicious purposes.<\/p>\n<p>Once a system is compromised and infected with malware like JokerSpy, the attacker effectively has a great degree of control over the system. With a backdoor, attackers can install additional components in the background, and could potentially run further exploits, monitor users&#8217; behavior, steal login credentials or cryptocurrency wallets, and more.<a name=\"how-to-remove\"><\/a><\/p>\n<h3>How can one remove or prevent JokerSpy and other Mac malware?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/p>\n<p>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate this Mac malware. Intego products detect components of this threat as <strong>OSX\/JokerSpy<\/strong>,\u00a0<strong>Python\/JokerSpy<\/strong>, or names similar to <strong>adware\/OSX\/Agent.jlejb<\/strong>.<\/p>\n<p>If you believe your Mac may be infected\u2014or to prevent future infections\u2014use trusted antivirus software. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It&#8217;s compatible with a variety of Mac hardware and OS versions, including the latest Apple silicon Macs running macOS Ventura.<\/p>\n<p>Additionally, if you use a Windows PC, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from this and other PC malware.<\/p>\n<p><span style=\"font-size: small;\">VirusBarrier X6, X7, and X8 on older Mac OS X versions also provide protection. Note, however, that it is best to upgrade to the latest versions of macOS and VirusBarrier; this will help ensure your Mac gets all the latest security updates from Apple.<a name=\"whodunit\"><\/a><\/span><\/p>\n<h3>Is JokerSpy related to SysJoker?<\/h3>\n<p>JokerSpy is not known to be related to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/sysjoker-cross-platform-backdoor-malware-for-mac-windows-and-linux\/\">SysJoker<\/a>, which we wrote about in January 2022, but there are some coincidental similarities. Both are multi-platform backdoor malware families with components that can infect macOS, Windows, and Linux PCs. And interestingly, both are known to have used GitHub lookalike domains.<\/p>\n<p>In the case of JokerSpy, the &#8220;joker&#8221; part of the name comes from the apparent username of its developer&#8217;s macOS login; &#8220;Spy&#8221; is also found in the same path string in one of JokerSpy&#8217;s macOS executable files: <code>\/Users\/joker\/Downloads\/Spy\/XProtectCheck\/<\/code><\/p>\n<p>One research group <a href=\"https:\/\/www.elastic.co\/security-labs\/inital-research-of-jokerspy\" target=\"_blank\" rel=\"noopener nofollow\">noted<\/a> that a particular sample of JokerSpy malware &#8220;has a code signature resembling&#8221; a payload from the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/smoothoperator-3cx-voip-app-spreads-mac-malware-by-lazarus-group-apt\/\">SmoothOperator Trojanized 3CX software<\/a> that Intego wrote about in April 2023.<a name=\"iocs\"><\/a><\/p>\n<h3>JokerSpy indicators of compromise (IoCs)<\/h3>\n<p>The following SHA-256 hashes may relate to JokerSpy malware campaigns:<\/p>\n<pre>39bbc16028fd46bf4ddad49c21439504d3f6f42cccbd30945a2d2fdb4ce393a4\r\n5fe1790667ee5085e73b054566d548eb4473c20cf962368dd53ba776e9642272\r\n6d3eff4e029db9d7b8dc076cfed5e2315fd54cb1ff9c6533954569f9e2397d4c\r\n8ca86f78f0c73a46f31be366538423ea0ec58089f3880e041543d08ce11fa626\r\n951039bf66cdf436c240ef206ef7356b1f6c8fffc6cbe55286ec2792bf7fe16c\r\naa951c053baf011d08f3a60a10c1d09bbac32f332413db5b38b8737558a08dc1\r\nd895075057e491b34b0f8c0392b44e43ade425d19eaaacea6ef8c5c9bd3487d8<\/pre>\n<p>The following command-and-control (C&amp;C) domains have reportedly been used in conjunction with this malware:<\/p>\n<pre>git-hub[.]me\r\napp.influmarket[.]org<\/pre>\n<p>Network administrators can check recent network traffic logs to try to identify whether any computers on their network may have attempted to contact one of these domains, which could indicate a possible infection.<\/p>\n<p>The first domain above was previously <a href=\"https:\/\/twitter.com\/MauroEldritch\/status\/1624033136269991938\" target=\"_blank\" rel=\"noopener\">observed<\/a> in connection with &#8220;QRLog&#8221; Java RAT malware, according to researcher Mauro Eldritch in a February 2023 write-up. (The original analysis is no longer online; see the <a href=\"https:\/\/cc.bingj.com\/cache.aspx?q=https%3a%2f%2fgithub.com%2fMauroEldritch%2fQRLog&amp;d=4934698636089350&amp;mkt=en-US&amp;setlang=en-US&amp;w=TfrTJAiizqLECoV_-hJHTjHHdXnE5IKm\" target=\"_blank\" rel=\"noopener\">Bing cached version<\/a> and an <a href=\"https:\/\/web.archive.org\/web\/20230623212358\/https:\/\/cc.bingj.com\/cache.aspx?q=https%3A%2F%2Fgithub.com%2FMauroEldritch%2FQRLog&amp;d=4934698636089350&amp;mkt=en-US&amp;setlang=en-US&amp;w=TfrTJAiizqLECoV_-hJHTjHHdXnE5IKm\" target=\"_blank\" rel=\"noopener\">Internet Archive backup<\/a> thereof.)<a name=\"other-names\"><\/a><\/p>\n<h3>Is JokerSpy known by any other names?<\/h3>\n<p>Other vendors&#8217; names for threat components related to this malware campaign may include variations of the following, among others:<\/p>\n<p><span style=\"font-size: small;\">Adware.ADWARE\/OSX.Agent.gedwx, Adware.ADWARE\/OSX.Agent.jlejb, Adware\/Joker!OSX, Backdoor.Python.JokerSpy.a, Backdoor.Python.JokerSpy.b, HEUR:Trojan.OSX.JokerSpy.a, Joke:MacOS\/Multiverze, MacOS:Joker-B [Trj], OSX.Trojan.Gen, OSX\/JokerSpy-A, OSX\/Spy.Joker.A, Python:Joker-A [Trj], Python:Joker-B [Trj], Python\/Spy.Joker.A, Riskware.OSX.Agent.1!c, Trojan Horse, Trojan:Python\/PyJoker.AC, Trojan.MAC.JokerSpy.A (B), Trojan.MAC.JokerSpy.A [many], Trojan.MAC.JokerSpy.C (B), Trojan.OSX.JokerSpy.4!c, Trojan.Python.JokerSpy.A (B), Trojan.Python.JokerSpy.B (B), Trojan.Python.JokerSpy.C (B), Trojan.Script.JokerSpy.4!c, Trojan.Win32.FRS.VSNW15F23<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional technical details about the JokerSpy malware, you can read <a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">Lapusneanu and Botezatu&#8217;s write-up<\/a> from June 16, and <a href=\"https:\/\/www.elastic.co\/security-labs\/inital-research-of-jokerspy\" target=\"_blank\" rel=\"noopener nofollow\">Wilhoit, Bitam, Goodwin, Pease, and Ungureanu&#8217;s write-up<\/a> from June 21.<\/p>\n<p>We briefly discussed JokerSpy on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-passkeys-apple-security-updates-and-new-private-browsing-features-intego-mac-podcast-episode-297\/\">episode 297<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+Oss52L2a?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p><span style=\"font-size: x-small;\">JokerSpy logo images based on: &#8220;<a href=\"https:\/\/www.flickr.com\/photos\/83670821@N04\/7759264414\" target=\"_blank\" rel=\"noopener noreferrer\">Jester- Joker Card<\/a>&#8221; by GoShows (<a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\" target=\"_blank\" rel=\"noopener noreferrer\">CC BY 2.0<\/a>) and &#8220;<a href=\"https:\/\/www.flickr.com\/photos\/60057912@N00\/5508849065\" target=\"_blank\" rel=\"noopener noreferrer\">Matrix &#8211; iPhone Background<\/a>&#8221; by Patrick Hoesly (CC BY 2.0); both images modified.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware&#8217;s early stages includes a cross-platform component, hinting that variants of JokerSpy may also exist for Windows and Linux as well. Let&#8217;s explore what you need to know about this new Mac threat and how to stay protected. [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":98359,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware&#039;s early stages includes a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JokerSpy backdoor Mac malware discovered in the wild - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware&#039;s early stages includes a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-24T01:17:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-12T18:45:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"JokerSpy Python Mac malware logo\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/\",\"name\":\"JokerSpy backdoor Mac malware discovered in the wild - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#primaryimage\"},\"datePublished\":\"2023-06-24T01:17:40+00:00\",\"dateModified\":\"2023-08-12T18:45:32+00:00\",\"description\":\"In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware's early stages includes a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"JokerSpy backdoor Mac malware discovered in the wild\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"JokerSpy backdoor Mac malware discovered in the wild\",\"datePublished\":\"2023-06-24T01:17:40+00:00\",\"dateModified\":\"2023-08-12T18:45:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#webpage\"},\"wordCount\":926,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg\",\"keywords\":[\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware's early stages includes a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/","og_locale":"en_US","og_type":"article","og_title":"JokerSpy backdoor Mac malware discovered in the wild - The Mac Security Blog","og_description":"In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware's early stages includes a","og_url":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-06-24T01:17:40+00:00","article_modified_time":"2023-08-12T18:45:32+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg","width":400,"height":260,"caption":"JokerSpy Python Mac malware logo"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/","name":"JokerSpy backdoor Mac malware discovered in the wild - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#primaryimage"},"datePublished":"2023-06-24T01:17:40+00:00","dateModified":"2023-08-12T18:45:32+00:00","description":"In June, two research teams independently discovered a new Mac malware family, dubbed JokerSpy. One of the malware's early stages includes a","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"JokerSpy backdoor Mac malware discovered in the wild"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"JokerSpy backdoor Mac malware discovered in the wild","datePublished":"2023-06-24T01:17:40+00:00","dateModified":"2023-08-12T18:45:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#webpage"},"wordCount":926,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg","keywords":["Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/jokerspy-backdoor-mac-malware-discovered-in-the-wild\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/JokerSpy-malware-logo-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pAn","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98355"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98355"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98355\/revisions"}],"predecessor-version":[{"id":98626,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98355\/revisions\/98626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/98359"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}