{"id":5863,"date":"2017-05-02T17:54:31","date_gmt":"2017-05-02T17:54:31","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=5863"},"modified":"2018-01-29T21:36:25","modified_gmt":"2018-01-29T21:36:25","slug":"end-of-innocence","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/end-of-innocence","title":{"rendered":"The End of Innocence"},"content":{"rendered":"<h2 style=\"text-align: center\"><strong>The End of Innocence<\/strong><\/h2>\n<h3 style=\"text-align: center\">And Tips to Keep your Apple devices safe.<\/h3>\n<p>For years, Windows users were the main target for malware writers, since Windows based systems got the larger chunk of the market. Mac users as a minority, have remained safe, and took no heed of warnings that the time of innocence would soon be over. The growing popularity of Mac devices is causing the malware for Macs to become a real threat these days. Security researchers at Check Point, have recently discovered the first \u201cmajor scale\u201d trojan for Apple\u2019s desktop OS \u2013 OSX\/Mac Dok.<\/p>\n<p>The Mac Dok malware is spread through phishing emails. Such emails feature ZIP attachments, and trick users into downloading them. Once unzipped, installed and launched, the malware takes control over your system. Hence the nickname of it \u2013 trojan, like the Trojan Horse. You get a gift, but with a twist.<\/p>\n<p>This is done to intercept your traffic and impersonate web-site. Like ticket selling sites or your bank on-line services. You might enter your credit card information, not knowing that the site is actually a fake one. Job done, the culprits can remove the malware from your system remotely and no one even knows it was ever there in the first place.<\/p>\n<p>So, Survival Rule #1 goes: Never download ZIP files from untrusted sources. Period. The malware features a fake certificate in order to bypass Apple\u2019s Gatekeeper verification, and gains full access to the device. The OSX\/Mac Dok \u2014 affects all versions of OSX, has 0 detections on VirusTotal. Virus Total is the largest on-line list of viruses, trojans, malwares and adwares. Apple hasn\u2019t issued a patch for this hole in the software yet, which is why it\u2019s better to follow the proverb: Better safe than sorry.<\/p>\n<p>The possible good news from this is that the malware mostly \u201cdoctors\u201d European users. A user in Germany was baited with a message regarding alleged issues with the tax returns. The zipped archive was named Dokument.zip and signed on April 21th 2017 by a \u201cSeven Muller\u201d. The bundle name was Truesteer.AppStore. You got it? The criminals used the name of the trusted on-line store in order to lure the victim in.<\/p>\n<p>What happens when you try to unzip the archive? The message pops up that the archive is damaged and cannot be executed. But, this is a lie. While you read this very message, the malware is being installed to the \/Users\/Shared\/ folder. Then, it will go on and run the shell commands meant to replace the login item.<\/p>\n<p>It\u2019ll get stuck in the system and execute automatically every system reboot, until it finishes to install its payload. Then, a window opens on top of all the other windows. The message this window contains is innocent enough, it simply says, \u201cYou\u2019ve got a security issue, and an update is available to patch it. Just put in your password, and you\u2019ll be okay\u201d. You can\u2019t access other windows though, and you can\u2019t close or minimize this one until you enter the password. The moment you do, the malware is given the administrator privileges on the infested machine.<\/p>\n<p>What does mean for you? It means, the malware can install and run any software without you knowing it, let alone approving. OSX \/ Mac Dok then changes the network settings and route all outgoing connections through the malicious proxy server. The criminals can intercept all your actions online: banking, e-mailing, messaging, paying in online stores. They can impersonate you and hack protected sites and resources, as well.<\/p>\n<p>To avoid all these troubles, please, follow the guide below:<\/p>\n<ul>\n<li>Don\u2019t open the attachments sent to you from unknown e-mail addresses. Never open them. Especially ZIP files. N-E-V-E-R. If you are emailed by some officially looking correspondent, i.e. tax office or your provider, check their official websites back to make sure the e-mail coincides. If you still have some doubts, contact them back and ask if they really send such e-mails.<\/li>\n<li>If you\u2019re sent a link from your pal, saying, \u201cOh, I\u2019ve seen you in this picture, have a look, is it you?\u201d, again check the friend back and ask if he or she really e-mailed you.<\/li>\n<li>Do not download files from the sources other than iTunes and App Store.<\/li>\n<li>Install the up-to-date antivirus software and turn on the anti-phishing add-on.<\/li>\n<\/ul>\n<p>See also:<\/p>\n<ul>\n<li>Sell your old and used device online for top dollar. Easy as one, two, three. We buy at best price. We have earned 5-star Customer Rating. Get cash fast. Sounds like the best deal: <a href=\"https:\/\/igotoffer.com\" target=\"_blank\" rel=\"noopener noreferrer\">Sell old electronics<\/a> online now!<\/li>\n<\/ul>\n<div id=\"attachment_1391\" style=\"width: 447px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-1391\" loading=\"lazy\" class=\"size-full wp-image-1391\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/08\/itunes_u.jpg\" alt=\"iTunes U\" width=\"437\" height=\"328\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/08\/itunes_u.jpg 437w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/08\/itunes_u-300x225.jpg 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/08\/itunes_u-200x150.jpg 200w\" sizes=\"(max-width: 437px) 100vw, 437px\" \/><p id=\"caption-attachment-1391\" class=\"wp-caption-text\">The Locked Net. Photo: iGotOffer.com<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers, since Windows based systems got the larger chunk of the market. Mac users as a minority, have remained safe, and took no heed of warnings that the time of innocence would soon [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1162,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[460],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The End of Innocence | iGotOffer<\/title>\n<meta name=\"description\" content=\"The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers as Windows based systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/end-of-innocence\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The End of Innocence | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers as Windows based systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/end-of-innocence\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/svetlana.ustinova2\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-02T17:54:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-29T21:36:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/02\/Mobile-Security.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"181\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/end-of-innocence#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/02\/Mobile-Security.jpeg\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/02\/Mobile-Security.jpeg\",\"width\":181,\"height\":240,\"caption\":\"Unlock iPad Mini\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/end-of-innocence#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/end-of-innocence\",\"name\":\"The End of Innocence | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/end-of-innocence#primaryimage\"},\"datePublished\":\"2017-05-02T17:54:31+00:00\",\"dateModified\":\"2018-01-29T21:36:25+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\"},\"description\":\"The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers as Windows based systems\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/end-of-innocence#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/end-of-innocence\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/end-of-innocence#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The End of Innocence\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\",\"name\":\"Steve\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"caption\":\"Steve\"},\"sameAs\":[\"https:\/\/igotoffer.com\/\",\"https:\/\/www.facebook.com\/svetlana.ustinova2\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The End of Innocence | iGotOffer","description":"The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers as Windows based systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/end-of-innocence","og_locale":"en_US","og_type":"article","og_title":"The End of Innocence | iGotOffer","og_description":"The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers as Windows based systems","og_url":"https:\/\/igotoffer.com\/blog\/end-of-innocence","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_author":"https:\/\/www.facebook.com\/svetlana.ustinova2","article_published_time":"2017-05-02T17:54:31+00:00","article_modified_time":"2018-01-29T21:36:25+00:00","og_image":[{"width":181,"height":240,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/02\/Mobile-Security.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"Steve","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/end-of-innocence#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/02\/Mobile-Security.jpeg","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2015\/02\/Mobile-Security.jpeg","width":181,"height":240,"caption":"Unlock iPad Mini"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/end-of-innocence#webpage","url":"https:\/\/igotoffer.com\/blog\/end-of-innocence","name":"The End of Innocence | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/end-of-innocence#primaryimage"},"datePublished":"2017-05-02T17:54:31+00:00","dateModified":"2018-01-29T21:36:25+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16"},"description":"The End of Innocence And Tips to Keep your Apple devices safe. For years, Windows users were the main target for malware writers as Windows based systems","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/end-of-innocence#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/end-of-innocence"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/end-of-innocence#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The End of Innocence"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16","name":"Steve","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","caption":"Steve"},"sameAs":["https:\/\/igotoffer.com\/","https:\/\/www.facebook.com\/svetlana.ustinova2"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/5863"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=5863"}],"version-history":[{"count":0,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/5863\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/1162"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=5863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=5863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=5863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}