{"id":749,"date":"2012-04-16T13:46:51","date_gmt":"2012-04-16T17:46:51","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/?p=749"},"modified":"2012-12-23T05:15:45","modified_gmt":"2012-12-23T09:15:45","slug":"ok-mac-guys-here-we-go-again","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2012\/04\/16\/ok-mac-guys-here-we-go-again\/","title":{"rendered":"OK Mac guys here we go again!"},"content":{"rendered":"<p>There\u2019s Another Mac Trojan Spreading Via Microsoft Office documents and email attachments. The Trojan apparently spreads through infected Office documents, and it&#8217;s in &#8220;active stage&#8221;, which means that it searches through documents on infected machines.<\/p>\n<p>Please note that this is a very sophisticated and malicious attack that not only &#8216;infects&#8217; your machine but also installs a &#8216;bot&#8217; to control it, scan through your system, and take what ever it wants to! <strong>ALL WITHOUT YOUR INTERACTION AFTER THE FIRST INFECTION!<\/strong><\/p>\n<p>The attack vector utilizes several vulnerabilities. The Java whole that Apple finally just fixed last week. And a Microsoft vulnerability that MS patched 3 years ago. (but they may update that patch too).<\/p>\n<p>Please folks keep your Operating System, <span style=\"text-decoration: underline;\">Applications<\/span> and security software up to date and don&#8217;t be one of those poor naive bastards that thinks this cannot happen to you.<br \/>\n<strong>You can read more <\/strong><a href=\"http:\/\/www.theregister.co.uk\/2012\/04\/15\/new_osx_backdoor\/\"><strong>here<\/strong><\/a><strong> and <\/strong><a href=\"http:\/\/bit.ly\/IPuWME\"><strong>here<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s Another Mac Trojan Spreading Via Microsoft Office documents and email attachments. The Trojan apparently spreads through infected Office documents, and it&#8217;s in &#8220;active stage&#8221;, which means that it searches through documents on infected machines. Please note that this is a very sophisticated and malicious attack that not only &#8216;infects&#8217; your machine but also installs &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2012\/04\/16\/ok-mac-guys-here-we-go-again\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;OK Mac guys here we go again!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[149,7,21,13,151,61],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/749"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=749"}],"version-history":[{"count":2,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/749\/revisions"}],"predecessor-version":[{"id":893,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/749\/revisions\/893"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}