Endpoint

1/19/2017
05:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Old-School Mac OS Malware Spotted Targeting Biomedical Industry

Apple patches Mac OS for retro and stealthy 'Fruitfly' malware.

Apple has quietly issued a security fix for a new yet retro-looking malware sample recently found on a Mac machine sitting in a university health center.

The so-called FruitFly malware, analyzed and detailed in a blog post yesterday by Malwarebytes researchers, thus far has infected at least three biomedical research sites and may have been running on the Mac machine at the university site at least since January of 2015.

"They said they found it because it was making some high-volume, unusual network traffic," says Thomas Reed, director of Mac offerings at Malwarebytes. "It looks like it had been on that computer for a couple of years before being discovered. I don't know if the unusual network traffic was because something [in the malware] was not functioning at that point, or maybe that they [the attackers] had done something new that showed something significant."

Neither the victim nor Malwarebytes know just how the malware got onto the Mac machine, whether it was dropped via some sort of Trojan or if it came via an Adobe Flash Player or other exploit. So the initial infection vector remains a mystery for now.

"That might be the missing piece of the puzzle," says Bogdan Botezatu, a senior analyst with Bitdefender, who studied the findings by Malwarebytes.

But for such a stealthy payload, FruitFly may be one of the most rudimentary malware samples the researchers have seen for some time. It's made up of two files, and the malware basically runs as a process in user space, notes Reed. "It's not even a privileged program; there's no root access. So no vulns are involved there."

The binary uses the open-source "libjpeg" code, which dates back to 1998, which was also the last time that code was updated. The malware takes screen captures, Web cam access, mouse-cursor control, and simulated keystrokes, all of which indicated some sort of old-school remote control function, according to Reed.

Malwarebytes has evidence that FruitFly has been around at least since 2014, and similar malware for Windows servers date back to 2013. "We saw some evidence of the command-and-control for it since 2011," Reed says. "This has been around for awhile."

The retro code design may either be the handiwork of an unsophisticated Mac malware writer, or the reverse: a sophisticated attacker who is purposely hiding in plain sight with older code that wouldn't necessarily capture the attention of modern-day heuristic-detection systems, he says.

Bitdefender's Botezatu says the malware's makeup is "not impressive," so his theory is that there are other components of the attack that have not yet been discovered. "This vector is really simple: it doesn't do much. It takes screenshots, which is de facto behavior for attackers" for instance, he explains.

"What's really odd in this code is that it kind of looks like it was stitched together," he says. "This doesn't look like it has been written by the same person in the same codestream. I think it's been stitched together and taken from different, various places. You might then think that these guys don't know the Mac ecosystem very well."

Both Reed and Botezatu separately say that it could well have been a spinoff from a Linux-based version of the malware. Malwarebytes found Linux shell commands in the original script, although they did not find a Linux sample as yet. "One of our researchers actually took the malware and ran it on a Linux machine … one of the three components was a Mac app and it wouldn't run on Linux. Everything else did," Reed says.

Botezatu says FruitFly's Linux connection reminds him of the KeRanger ransomware discovered for Mac OS X more than a year ago. "It was Mac ransomware that affected initially Linux computers. Then we found it ported for the Mac OS and delivered by an infected transmission controller," he recalls. "That was the first piece of ransomware we'd seen for Macs … We've seen these kinds of migrations recently where cybercriminals started off with Linux payloads and then have adapted to Macs because it's really easy to ... recompile them for Macs."

The takeaway: Mac users should run anti-malware software, both Reed and Botezatu concur. While Mac machines are far less at risk of commercial malware than Windows machines, they're still vulnerable to targeted attacks, adware, and "potentially unwanted programs" (aka PUPS).

If more Macs ran anti-malware, security researchers would have a better look at the threats on those machines, too, Botezatu says. "We have no idea if we don't have those eyes into the Mac space that we have on Windows."

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
CVE-2018-17980
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
CVE-2018-18259
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
CVE-2018-18260
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
CVE-2018-17532
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.