Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

New MacOS Malware Discovered

A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.

A wave of malware targeting MacOS over the past month has raised the profile of the operating system once advertised as much safer than Windows. The newest attack code for the Mac includes three pieces of malware found in June — a zero-day exploit, a package that includes sophisticated anti-detection and obfuscation routines, and a family of malware that uses the Safari browser as an attack surface.

The zero-day exploit, dubbed OSX/Linker by researchers at Intego who discovered it, takes advantage of a vulnerability in MacOS Gatekeeper — the MacOS function that enforces code-signing and has the ability to limit program execution to properly sign code from trusted publishers.

The MacOS X GateKeeper Bypass vuln used in OSX/Linker was first discovered in February 2019 by independent researcher Filippo Cavallarin, who says that he notified Apple of the finding. After a 90-day disclosure deadline passed, Cavallarin publicly disclosed the vulnerability on May 24.

The vulnerability itself is in the way GateKeeper treats files on the local network, which don't receive the same locked-down scrutiny as files from the Internet. A cleverly formatted program can pretend that a file on a server sitting anywhere is on the local network, and should therefore be trusted.

Joshua Long, chief security analyst at Intego, says that OSX/Linker is the first evidence he knows of malicious actors trying to take advantage of the vulnerability, which is still unpatched by Apple as of this posting. "The sample that we found actually appeared to be just a proof-of-concept at the time that it was uploaded to VirusTotal," Long says. "It was able to write something to to a text file on the victim's computer."

The second piece of malware found by Intego researchers takes a long-used technique and adds "stealth" to the mix: the so-called OSX/CrescentCore is the name given to a new generation of fake Adobe Flash Player malware that adds significant obfuscation to its capabilities. "This is another bit of malware that is exploiting people's fear of having outdated software that might allow their computer to become infected," Long says.

The malware first checks to see whether it's being run inside a VM. If so, it won't complete installation. Similar checks are then done for common anti-malware software and reverse-engineering tools.

"This was actually found in the wild," Long says. "Unlike OSX/Linker, which seemed to have been a proof-of-concept, based on the nature of it, it's possible that this could have been used."

Intego researchers also discovered another exploit, OSX/NewTab, which injects new tabs into the Safari browser — tabs that can contain additional loaders and malware packages.

The three malware packages found by Intego in June are just the latest examples of increasing activity in MacOS malware.  A zero-day exploit in Firefox, described in detail by researcher Patrick Wardle in a three-part series, now can spread a variety of MacOS malware types. So far, the malware families dropped via the exploit have been backdoor spyware programs that can log keystrokes and take screenshots of the victim's computer.

Meanwhile, in June, a Mac-based cryptominer named LoudMiner or Bird Miner arrived on the scene. Described in detail by researchers Michel Malik of ESET and Thomas Reed of Malwarebytes Labs, LoudMiner is notable for creating a small Linux instance running in a virtual machine and then running the cryptomining software on the Linux platform. Attackers are using weaponized music applications as carriers for the new cryptominers.

Changing Malware Fortunes

The new MacOS malware variants indicate that the OS is becoming worth cybercriminals' time to develop malware for the platform, Long says. And that additional attention has an unexpected consequence: "It's clear to me that Windows, at this point, could easily be described as a safer platform than MacOS," he says, overturning a Macintosh reputation for security that was once so well-established that Apple once ran ads touting safety.

That's because, Long says, MacOS has become more of a target, and newer versions of Windows come with big security improvements. "Microsoft has had to do a lot of things to improve their image," Long says. "They've built in to their operating system a much better, more robust anti-malware capability than we've seen on MacOS."

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...