{"id":4297,"date":"2023-12-15T06:25:24","date_gmt":"2023-12-15T06:25:24","guid":{"rendered":"https:\/\/cleanerone.trendmicro.com\/blog\/?p=4297"},"modified":"2023-12-15T06:25:24","modified_gmt":"2023-12-15T06:25:24","slug":"new-trojan-proxy-malware","status":"publish","type":"post","link":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/","title":{"rendered":"New Trojan-Proxy Malware Targets Mac Users via Pirated Software"},"content":{"rendered":"<h2><strong>What is Trojan-Proxy malware?<\/strong><\/h2>\n<p>Cybercriminals are intensifying their assault on Mac users with a sophisticated Trojan-Proxy malware campaign, as reported by cybersecurity firm Kaspersky. This cross-platform threat targets users seeking free versions of popular macOS software on unauthorized websites. The malware infiltrates computers through pirated tools, transforming them into traffic-forwarding terminals for anonymizing criminal activities such as hacking, phishing, and transactions for illicit goods.<\/p>\n<p>The campaign strategically capitalizes on users\u2019 willingness to compromise their computer\u2019s security to obtain premium apps without payment. Kaspersky identified 35 trojanized tools, including image editing, video compression, data recovery, and network scanning software, offered on warez sites. Notable trojanized software includes 4K Video Downloader Pro, Aiseesoft Mac Data Recovery, Sketch, and more.<\/p>\n<p><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-1024x400.png.webp 1024w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-300x117.png.webp 300w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-768x300.png.webp 768w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-1536x600.png.webp 1536w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware.png.webp 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" type=\"image\/webp\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-4299 webpexpress-processed\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-1024x400.png\" alt=\"\" width=\"1024\" height=\"400\" srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-1024x400.png 1024w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-300x117.png 300w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-768x300.png 768w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware-1536x600.png 1536w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/trojan-proxy-malware.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/picture><\/p>\n<h2><strong>How does Trojan-Proxy malware work?<\/strong><\/h2>\n<p>The Trojan-Proxy malware disguises itself within PKG files, unlike legitimate software distributed as disk images (.DMG). This malicious tactic allows the execution of scripts during the installation process, posing significant risks. With administrator rights granted during installation, the embedded scripts perform dangerous actions like file modification, autorun, and command execution.<\/p>\n<p>Upon installation, the malware activates the Trojan-Proxy, masquerading as the WindowServer process to blend with routine system operations and evade user scrutiny. The WindowServer is a legitimate macOS system process responsible for managing the graphic user interface. The Trojan-Proxy connects to its command and control (C2) server via DNS-over-HTTPS (DoH) to receive operational commands. The C2 infrastructure supports proxy trojan payloads for Android and Windows, indicating a broader target range.<\/p>\n<p>In a parallel discovery, Kaspersky found evidence of a related Trojan-Proxy malware affecting Apple macOS users through unauthorized websites distributing trojanized versions of cracked software. This sophisticated threat operates as a cross-platform menace, with artifacts suggesting a connection to Windows and Android.<\/p>\n<p>The macOS variants of the malware present themselves as legitimate multimedia, image editing, data recovery, and productivity tools, mainly targeting users seeking pirated software. The rogue versions, delivered through .PKG installers, contain post-install scripts for malicious activation. To enhance its stealth, the malware mimics the WindowServer process and communicates with its C2 server through encrypted DNS-over-HTTPS.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How to protect your Mac against Trojan-Proxy malware?<\/strong><\/h2>\n<p>Both Kaspersky&#8217;s warnings highlight the severity of the threat and advise users to refrain from downloading software from untrusted sources. By staying vigilant and avoiding pirated software, users can contribute to mitigating the risks associated with these Trojan-Proxy malware campaigns.<\/p>\n<p>However, if you\u2019re concerned that malicious malware has been installed on your device, you can download <a href=\"https:\/\/apps.apple.com\/us\/app\/antivirus-one-virus-cleaner\/id1068435535?mt=12\" target=\"_blank\" rel=\"noopener\"><strong>Antivirus One<\/strong><\/a> to check for free. Once your Mac gets infected, the malware will keep creating malicious files. The longer you wait, the more damage will be done to your computer. <a href=\"https:\/\/apps.apple.com\/us\/app\/antivirus-one-virus-cleaner\/id1068435535?mt=12\" target=\"_blank\" rel=\"noopener\"><strong>Antivirus One<\/strong><\/a> is a professional and reliable antivirus app, which performs superbly across the board in malware detection and threat protection. It offers live antivirus monitoring to protect your Mac from adware, ransomware, spyware, and all kinds of malware attacks.<\/p>\n<p>Additionally, if your device has already been affected by the Trojan-Proxy malware, you can use <a href=\"https:\/\/apps.apple.com\/us\/app\/antivirus-one-virus-cleaner\/id1068435535?mt=12\" target=\"_blank\" rel=\"noopener\"><strong>Antivirus One<\/strong><\/a> to run a comprehensive scan and thoroughly eliminate the adware and any related items.<\/p>\n<p><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-1024x635.png.webp 1024w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-300x186.png.webp 300w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-768x476.png.webp 768w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One.png.webp 1248w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" type=\"image\/webp\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-4003 webpexpress-processed\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-1024x635.png\" alt=\"\" width=\"1024\" height=\"635\" srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-1024x635.png 1024w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-300x186.png 300w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One-768x476.png 768w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/07\/Antivirus-One.png 1248w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/picture>Here are some of Antivirus One\u2019s awesome features:<\/p>\n<ul>\n<li>Real-time Detection \u2014 Protects your Mac against all threats 24\/7.<\/li>\n<li>Virus Scanner \u2014 Scan files and locations to safeguard every part of your Mac.<\/li>\n<li>Virus Cleaner \u2014 Automatically remove viruses to secure your system and privacy.<\/li>\n<li>Adware Cleaner \u2014 Get rid of pop-ups, adware, and browser hijackers so you can browse safely.<\/li>\n<li>Privacy Cleaner \u2014 Hide your information to prevent others from identifying you.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>More than ever, your mac needs further protection. So what are you waiting for? Download <a href=\"https:\/\/apps.apple.com\/us\/app\/antivirus-one-virus-cleaner\/id1068435535?mt=12\" target=\"_blank\" rel=\"noopener\"><strong>Antivirus One<\/strong><\/a> for free!<\/p>\n<p><a href=\"https:\/\/apps.apple.com\/us\/app\/id1068435535?pt=444218&amp;ct=trojanproxymalware&amp;mt=8\" target=\"_blank\" rel=\"noopener\"><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-300x104.png.webp 300w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-1024x354.png.webp 1024w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-768x265.png.webp 768w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-1536x531.png.webp 1536w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-2048x708.png.webp 2048w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-1170x400.png.webp 1170w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" type=\"image\/webp\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-4200 webpexpress-processed\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-300x104.png\" alt=\"Download Antivirus One\" width=\"300\" height=\"104\" srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-300x104.png 300w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-1024x354.png 1024w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-768x265.png 768w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-1536x531.png 1536w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-2048x708.png 2048w, https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/10\/download-on-the-app-store-1170x400.png 1170w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/picture><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Trojan-Proxy malware? Cybercriminals are intensifying their assault on Mac users with a sophisticated Trojan-Proxy malware campaign, as reported by cybersecurity firm Kaspersky. This cross-platform threat targets users seeking free versions of popular macOS software on unauthorized websites. The malware infiltrates computers through pirated tools, transforming them into traffic-forwarding terminals for anonymizing criminal activities such as hacking, phishing, and transactions for illicit goods. The campaign strategically capitalizes on users\u2019 willingness to compromise their computer\u2019s security to obtain premium apps without payment. Kaspersky identified 35 trojanized tools, including image editing, video compression, data recovery, and network scanning software, offered on <\/p>\n","protected":false},"author":2,"featured_media":4298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_locale":"en_US","_original_post":"https:\/\/cleanerone.trendmicro.com\/blog\/?p=4297","footnotes":""},"categories":[1,85],"tags":[],"class_list":["post-4297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-howto","category-mac","en-US","has_thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Trojan-Proxy Malware Targets Mac Users via Pirated Software<\/title>\n<meta name=\"description\" content=\"Be cautious! You might be a target of the new Trojan-Proxy malware! Keep reading to learn how to avoid becoming a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Trojan-Proxy Malware Targets Mac Users via Pirated Software\" \/>\n<meta property=\"og:description\" content=\"Be cautious! You might be a target of the new Trojan-Proxy malware! Keep reading to learn how to avoid becoming a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T06:25:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1316\" \/>\n\t<meta property=\"og:image:height\" content=\"838\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Louis.G\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louis.G\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/\",\"name\":\"New Trojan-Proxy Malware Targets Mac Users via Pirated Software\",\"isPartOf\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png\",\"datePublished\":\"2023-12-15T06:25:24+00:00\",\"dateModified\":\"2023-12-15T06:25:24+00:00\",\"author\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb\"},\"description\":\"Be cautious! You might be a target of the new Trojan-Proxy malware! Keep reading to learn how to avoid becoming a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#primaryimage\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png\",\"contentUrl\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png\",\"width\":1316,\"height\":838},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cleanerone.trendmicro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Trojan-Proxy Malware Targets Mac Users via Pirated Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#website\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/\",\"name\":\"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog\",\"description\":\"Keep up with latest stories and product updates from Cleaner One. News about technology, software,cybersecurity, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cleanerone.trendmicro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb\",\"name\":\"Louis.G\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/author\/louis-g\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Trojan-Proxy Malware Targets Mac Users via Pirated Software","description":"Be cautious! You might be a target of the new Trojan-Proxy malware! Keep reading to learn how to avoid becoming a victim.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/","og_locale":"en_US","og_type":"article","og_title":"New Trojan-Proxy Malware Targets Mac Users via Pirated Software","og_description":"Be cautious! You might be a target of the new Trojan-Proxy malware! Keep reading to learn how to avoid becoming a victim.","og_url":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/","og_site_name":"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog","article_published_time":"2023-12-15T06:25:24+00:00","og_image":[{"width":1316,"height":838,"url":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png","type":"image\/png"}],"author":"Louis.G","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Louis.G","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/","url":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/","name":"New Trojan-Proxy Malware Targets Mac Users via Pirated Software","isPartOf":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#primaryimage"},"image":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png","datePublished":"2023-12-15T06:25:24+00:00","dateModified":"2023-12-15T06:25:24+00:00","author":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb"},"description":"Be cautious! You might be a target of the new Trojan-Proxy malware! Keep reading to learn how to avoid becoming a victim.","breadcrumb":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#primaryimage","url":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png","contentUrl":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2023\/12\/new-trojan-proxy-malware.png","width":1316,"height":838},{"@type":"BreadcrumbList","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/new-trojan-proxy-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cleanerone.trendmicro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New Trojan-Proxy Malware Targets Mac Users via Pirated Software"}]},{"@type":"WebSite","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#website","url":"https:\/\/cleanerone.trendmicro.com\/blog\/","name":"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog","description":"Keep up with latest stories and product updates from Cleaner One. News about technology, software,cybersecurity, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cleanerone.trendmicro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb","name":"Louis.G","url":"https:\/\/cleanerone.trendmicro.com\/blog\/author\/louis-g\/"}]}},"_links":{"self":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/4297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/comments?post=4297"}],"version-history":[{"count":1,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/4297\/revisions"}],"predecessor-version":[{"id":4300,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/4297\/revisions\/4300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/media\/4298"}],"wp:attachment":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/media?parent=4297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/categories?post=4297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/tags?post=4297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}