Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

New MacOS Malware Discovered

A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.

A wave of malware targeting MacOS over the past month has raised the profile of the operating system once advertised as much safer than Windows. The newest attack code for the Mac includes three pieces of malware found in June — a zero-day exploit, a package that includes sophisticated anti-detection and obfuscation routines, and a family of malware that uses the Safari browser as an attack surface.

The zero-day exploit, dubbed OSX/Linker by researchers at Intego who discovered it, takes advantage of a vulnerability in MacOS Gatekeeper — the MacOS function that enforces code-signing and has the ability to limit program execution to properly sign code from trusted publishers.

The MacOS X GateKeeper Bypass vuln used in OSX/Linker was first discovered in February 2019 by independent researcher Filippo Cavallarin, who says that he notified Apple of the finding. After a 90-day disclosure deadline passed, Cavallarin publicly disclosed the vulnerability on May 24.

The vulnerability itself is in the way GateKeeper treats files on the local network, which don't receive the same locked-down scrutiny as files from the Internet. A cleverly formatted program can pretend that a file on a server sitting anywhere is on the local network, and should therefore be trusted.

Joshua Long, chief security analyst at Intego, says that OSX/Linker is the first evidence he knows of malicious actors trying to take advantage of the vulnerability, which is still unpatched by Apple as of this posting. "The sample that we found actually appeared to be just a proof-of-concept at the time that it was uploaded to VirusTotal," Long says. "It was able to write something to to a text file on the victim's computer."

The second piece of malware found by Intego researchers takes a long-used technique and adds "stealth" to the mix: the so-called OSX/CrescentCore is the name given to a new generation of fake Adobe Flash Player malware that adds significant obfuscation to its capabilities. "This is another bit of malware that is exploiting people's fear of having outdated software that might allow their computer to become infected," Long says.

The malware first checks to see whether it's being run inside a VM. If so, it won't complete installation. Similar checks are then done for common anti-malware software and reverse-engineering tools.

"This was actually found in the wild," Long says. "Unlike OSX/Linker, which seemed to have been a proof-of-concept, based on the nature of it, it's possible that this could have been used."

Intego researchers also discovered another exploit, OSX/NewTab, which injects new tabs into the Safari browser — tabs that can contain additional loaders and malware packages.

The three malware packages found by Intego in June are just the latest examples of increasing activity in MacOS malware.  A zero-day exploit in Firefox, described in detail by researcher Patrick Wardle in a three-part series, now can spread a variety of MacOS malware types. So far, the malware families dropped via the exploit have been backdoor spyware programs that can log keystrokes and take screenshots of the victim's computer.

Meanwhile, in June, a Mac-based cryptominer named LoudMiner or Bird Miner arrived on the scene. Described in detail by researchers Michel Malik of ESET and Thomas Reed of Malwarebytes Labs, LoudMiner is notable for creating a small Linux instance running in a virtual machine and then running the cryptomining software on the Linux platform. Attackers are using weaponized music applications as carriers for the new cryptominers.

Changing Malware Fortunes

The new MacOS malware variants indicate that the OS is becoming worth cybercriminals' time to develop malware for the platform, Long says. And that additional attention has an unexpected consequence: "It's clear to me that Windows, at this point, could easily be described as a safer platform than MacOS," he says, overturning a Macintosh reputation for security that was once so well-established that Apple once ran ads touting safety.

That's because, Long says, MacOS has become more of a target, and newer versions of Windows come with big security improvements. "Microsoft has had to do a lot of things to improve their image," Long says. "They've built in to their operating system a much better, more robust anti-malware capability than we've seen on MacOS."

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
Capital One Breach: What Security Teams Can Do Now
Dr. Richard Gold, Head of Security Engineering at Digital Shadows,  8/23/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
CVE-2019-12400
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
CVE-2019-15092
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.