{"id":4445,"date":"2011-05-27T18:00:22","date_gmt":"2011-05-28T01:00:22","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4445"},"modified":"2018-01-30T12:27:38","modified_gmt":"2018-01-30T19:27:38","slug":"macprotector-rogue-of-the-week","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/05\/27\/macprotector-rogue-of-the-week\/","title":{"rendered":"MacProtector: Rogue of the Week"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2003.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/05\/27\/macprotector-rogue-of-the-week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2013.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;title=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2023.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;title=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2033.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;title=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2043.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;title=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2053.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;Title=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2063.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=MacProtector%3A%20Rogue%20of%20the%20Week+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2073.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/05\/27\/macprotector-rogue-of-the-week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2083.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;headline=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2093.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F05%2F27%2Fmacprotector-rogue-of-the-week&amp;h=MacProtector%3A%20Rogue%20of%20the%20Week\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2103.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2113.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macprotector-logo.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-4447\" title=\"20110527_rotw-mac_macprotector-logo\" alt=\"MacProtector and Mac Guard logos\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macprotector-logo.png\" width=\"252\" height=\"118\" \/><\/a>This week, we turn our attention temporarily away from the never-ending stream of rogue security products on the Windows platform and take a closer look at the Mac OS analogue, <strong>MacProtector<\/strong> (aka <strong>Mac Security, Mac Defender, MacGuard<\/strong>, and&#8211;if history serves&#8211;soon to be many, many other names).<\/p>\n<p>There&#8217;s been a lot of press coverage of these rogues &#8212; including <a href=\"http:\/\/blog.webroot.com\/2011\/04\/18\/video-is-my-mac-safe-from-malware\/\" target=\"_blank\">a video blog post by us<\/a> &#8212; in the past few weeks, so we thought it was high time we took a deeper dive.<\/p>\n<p>Even though Webroot doesn&#8217;t offer an automated\u00a0removal\u00a0solution for the Mac, there\u2019s good news for most Mac users &#8212; with only a little bit of effort, it&#8217;s fairly rudimentary to simply delete the rogue .app and be done with it. In this case, the <strong>Activity Monitor<\/strong> (Apple&#8217;s GUI process monitor, located by default in the <em>Utilities<\/em> folder inside the <em>Applications<\/em> folder) is your best friend.<\/p>\n<p>The program appears as a stub .mpkg installer, which means that the application that installs the program isn&#8217;t a container with the full program stuffed inside. The installer drops an app named <strong>avRunner.app<\/strong> into the <em>Applications<\/em> directory, then executes it.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_downloadpop.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4448\" title=\"20110527_rotw-mac_downloadpop\" alt=\"MacDefender downloader\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_downloadpop.png\" width=\"400\" height=\"137\" \/><\/a><\/p>\n<p>avRunner.app simply downloads the full version of the rogue .app from a Web server (in our case, the file originated from the IP address <strong>86.55.210.102<\/strong>).<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_whatsmynameagain.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4472\" title=\"20110527_rotw-mac_whatsmynameagain\" alt=\"MacProtector\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_whatsmynameagain.png?w=300\" width=\"300\" height=\"298\" \/><\/a><\/p>\n<p>As with most rogues, the developers come up with names faster than the program&#8217;s UI gets updated, which makes the creators of the program look extremely dense. Here you can see the program running one window labeling itself as <strong>Mac Guard<\/strong>, with another window in the foreground that contains a bogus box-shot labeled <strong>Mac Defender<\/strong>, and a line of text beneath that box shot which says &#8220;You are purchasing <strong>MAC Security<\/strong>.&#8221; To bowdlerize the immortal words of <em>Blink 182<\/em>, what&#8217;s your name again?<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_systeminfectedpopup.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4449\" title=\"20110527_rotw-mac_systeminfectedpopup\" alt=\"MacProtector warning popup\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_systeminfectedpopup.png\" width=\"368\" height=\"105\" \/><\/a><\/p>\n<p>Having seen my share of rogues over the past several years, I have to tell my Mac-using friends <em>you ain&#8217;t seen nothing yet<\/em>. This rogue is kid stuff compared to the rogues that infect Windows boxes.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_control-center.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4457\" title=\"20110527_rotw-mac_control-center_crop\" alt=\"MacProtector\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_control-center_crop.png\" width=\"399\" height=\"183\" \/><\/a><\/p>\n<p>For one thing, there&#8217;s no Registry in the MacOS, so the rogue can&#8217;t readily make debilitating changes to the way the operating system functions. On Windows boxes, rogues typically are accompanied by rootkit drivers and registry modifications that, in essence, prevent you from doing almost anything useful on the infected computer.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macguard_startup.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4450\" title=\"20110527_rotw-mac_macguard_startup\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macguard_startup.png\" width=\"594\" height=\"263\" \/><\/a><\/p>\n<p>While the Mac rogues &#8212; like their big-city cousins, the Windows rogues &#8212; try hard to put on the airs of legitimacy, MacProtector (et al) ends up with egg on its face, just as the Windows rogues so often do. The scam is the same, but so are the stupid errors in these hastily constructed scams.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_scan-with-pops.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4452\" title=\"20110527_rotw-mac_scan-with-pops\" alt=\"MacProtector scan window\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_scan-with-pops.png?w=300\" width=\"300\" height=\"235\" \/><\/a><\/p>\n<p>Each variant we&#8217;ve looked at works in almost identical ways: The installer pulls down and launches the app; The app begins &#8220;scanning&#8221; almost immediately, and soon after scanning begins, reports that &#8220;The system is infected&#8221; with, uh, <em>something<\/em>. They&#8217;re making it all up as they go along anyway, so it doesn&#8217;t really matter what they call the malicious files.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_rogueprocmon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4460\" title=\"20110527_rotw-mac_rogueprocmon\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_rogueprocmon.png?w=300\" width=\"300\" height=\"242\" \/><\/a><\/p>\n<p>I was actually impressed to see that the program includes its own built-in process monitoring tool. Of course, you can&#8217;t actually <em>use<\/em> it to kill the rogue, but it works with any other running app or service on the machine.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_settingsbox1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4462\" title=\"20110527_rotw-mac_settingsbox\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_settingsbox1.png?w=300\" width=\"300\" height=\"132\" \/><\/a><\/p>\n<p>The program even has some settings you can modify, including the <em>Scan Type<\/em> (sadly, there&#8217;s no option for <strong>non-BS scan<\/strong>) and options that let you disable automatic execution on startup.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_networktraffic.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4453\" title=\"20110527_rotw-mac_networktraffic\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_networktraffic.png?w=300\" width=\"300\" height=\"113\" \/><\/a><\/p>\n<p>We also watched the program, after it sat idling for about 12 minutes on the infected computer, spawn instances of the Safari browser where it opened pages to such tasteful and family-friendly Web sites as <strong>gay.porn.com<\/strong> and <strong>buy-viagra-now.net<\/strong> in the background. I guess that&#8217;s supposed to push you over the edge, to convince you that you&#8217;re infected with something bad. (Your computer <em>is<\/em> infected, just not with what they&#8217;re claiming.) Stay classy, rogue antivirus guys.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macdef_prices.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4454\" title=\"20110527_rotw-mac_macdef_prices\" alt=\"MacProtector - only $100 what a steal\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macdef_prices.png\" width=\"470\" height=\"154\" \/><\/a><\/p>\n<p>The scam is that the program continuously throws warning messages onto the desktop while repeatedly prompting you to make a $100 purchase for a &#8220;license key.&#8221; The whole past week, the purchasing window loaded from the IP address <strong>91.213.217.30<\/strong>. <a href=\"http:\/\/www.brightcloud.com\/support\/lookup.php?endpoint=91.213.217.30\" target=\"_blank\">That IP has been blacklisted<\/a> in our definitions for its involvement in Windows rogue activity, so if you&#8217;re able to localhost it in your Hosts file, be my guest. You won&#8217;t be missing out on anything important if you do.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macguard_about-screen.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4455\" title=\"20110527_rotw-mac_macguard_about-screen\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_macguard_about-screen.png?w=300\" width=\"300\" height=\"254\" \/><\/a><\/p>\n<p>I&#8217;m quite impressed with the backstory fiction they&#8217;ve invented for their rogue. It would actually be quite compelling if it weren&#8217;t a steaming pile of horse puckey: 250 specialists in more than 10 countries, working around the clock, all just to protect your<em><strong> CREDIT CARD NUMBERS, ETC.<\/strong><\/em> Yeah, right.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_activitymonitor.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4463\" title=\"20110527_rotw-mac_activitymonitor_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_activitymonitor_crop.png?w=300\" width=\"300\" height=\"39\" \/><\/a><\/p>\n<p>Now, as for the fix, you&#8217;re in luck: Launch <strong>Activity Monitor<\/strong>, find the name of the rogue in the list of running processes, then click the little stop sign icon to Force Quit the rogue. Once that&#8217;s done, delete the .app from the Applications directory and you&#8217;re golden.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_apple_support_note.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4465\" title=\"20110527_rotw-mac_applecrop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_applecrop.png\" width=\"439\" height=\"115\" \/><\/a><\/p>\n<p>Remember, Mac users, <a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/05\/20110527_rotw-mac_apple_support_note.png\" target=\"_blank\">Apple won&#8217;t give you any support<\/a> if you get infected (after all, <a href=\"http:\/\/isc.sans.org\/diary\/Managing+CVE-0\/10933\" target=\"_blank\">it&#8217;s not an Apple software vulnerability that&#8217;s being exploited<\/a>), so you&#8217;ll have to do this all by yourself. <a title=\"Webroot blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"Webroot blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, we turn our attention temporarily away from the never-ending stream of rogue security products on the Windows platform and take a closer look at the Mac OS analogue, MacProtector (aka Mac Security, Mac Defender, MacGuard, and&#8211;if history serves&#8211;soon to be many, many other names). There&#8217;s been a lot of press coverage of these [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3915,8667,3775,8669,3487,4525,4531,3521,8663,8665,4441,4213,4893,8497,8661,3471,3951,8671,8673,4369],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4445"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4445"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4445\/revisions"}],"predecessor-version":[{"id":23743,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4445\/revisions\/23743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4445"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4445"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}