Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:00 PM
Connect Directly

Securing OS X: Apple, Security Vendors Need To Up Their Game

To date, OS X malware is pretty lame, but it's easy to write better malware to bypass current defenses, security researcher Patrick Wardle told a Black Hat audience last week.

BLACK HAT USA -- Las Vegas -- The current class of malware designed to infect Apple’s OS X operating system, “while sufficient, is inelegant, amateur, and trivial to detect and prevent,” according to Patrick Wardle, director of research and development with security firm Synack.

The problem is Apple and third party security companies are using the existing OS X malware to validate their tools. Yet, it is very easy to write even better malware to bypass current defenses for OS-X-based Mac computers, Wardle said. And, if he can do it, so can nation-states or malicious attackers.

So Wardle used his presentation, “Writing Bad @$$ Malware for OS X,” at the Black Hat conference last week as a wake-up call and a forum to demonstrate how to write better malware and to present some free security tools that can help prevent more advanced malware infections.

Mac computers are prevalent in the home and enterprise. In March, Apple officials reported that Mac notebook sales have grown 21 percent over the last year, while total industry sales have fallen.  Yet, Apple has claimed that Mac isn’t susceptible to the thousands of viruses plaguing Windows-based computers, Wardle noted.

In fact, the ‘first’ virus, Elk Cloner, infected Apple II computers. Over the last five years, 50 new OS X malware families have emerged. And, in 2014, there were nearly 1,000 unique attacks on Mac computers, according to Kaspersky Labs.

Using several recent OS X malware as examples -- OSX/XSLCMD, OSX/WIRELURKER (an iOS infector via USB) and OSX/CRISIS – Wardle drew some general observations about the current state of OS X malware.

In terms of infection, most use Trojans, meaning they require user interaction.  Some use phishing, but the exploits they deliver are older or already patched.  “So, security conscious users who keep their computers updated and email, probably will be fine,” Wardle said.

In terms of persistence, the malware use well-known techniques. The majority employ launch items that are easy to uncover, detect and prevent.  In terms of self-defense, there is minimal obfuscation and the malware is easy to detect and remove. From a stealth perspective, most 'hide' in plain sight and are stand-alone executables.   

“Features is one area that current OS X malware is sufficient, it gets the job done,” Wardle said. “But if you look closer at how these features are implemented, a lot of times it’s done in an amateur, inelegant way.” Finally, the malware does not have the ability to bypass personal firewalls and anti-virus software.

“The grade I would like to give current OS X malware is a C+.  It is sufficient, but inelegant, amateur, and trivial to detect and prevent,” Wardle said.  “So, my goal is to spur discussions to make better security tools so we can ultimately secure our Macs.

Apple has introduced security enhancements to thwart malware such as XProtect, a built-in anti-virus solution; Gatekeeper, which verifies downloaded software; sandboxing, which prevents Mac Store applications from accessing OS-level components; and signed-code requirements, which only allows signed kernel extensions to be loaded. 

Wardle demonstrated how many of these capabilities, although steps in the right direction, could be circumvented. For example, binary infection is an old school, but colorful attack mechanism, which is stealthy and hard to remove. Here an attacker would inject viral code into OS X binaries, effectively shutting down any other processes or files from running in the file system. 

Load time process injection could also be launched on the web browser.  Every time a browser is executed, the malicious code will also execute within a trusted context of the browser.  If a personal firewall is monitoring for untrusted connections it is going to trust the browser. The malware will not be detected because it is part of a trusted browser.

Wardle noted that the OS X loader, which validates the digital signature of applications in the binary, could block this attack. But there are ways to work around it. The loader looks for a signature block within the binary. If it is there, it validates it. But unlike iOS, OS X allows unsigned applications to execute. So the signature block can be pulled out and the malware can “infect away,” Wardle noted.

Wardle also showed ways malware can attack dynamic libraries in OS X to allow attackers to gain persistence on vulnerable systems, perform process injection and bypass security features such as Gatekeeper.

He also shared some of the tools he has written that will help protect Macs.  KnockKnock detects what’s persistence on the Mac. It can detect launch items, kernel extension, and malware. The only limitation is it is reactive; you have to manually run it.  So, he wrote a real-time detection tool called BlockBlock.   

Another tool, TaskExplorer, looks for all running tasks and processes. “You can write filters that say show all Apple apps running or unsigned code,” he said.

Hopefully, Wardle’s attempts to show how easily more lethal malware can be written for OS X will convince Apple to up its game and security vendors to improve their products, he said.

Rutrell Yasin has more than 30 years of experience writing about the application of information technology in business and government. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
8/26/2015 | 8:51:19 AM
Re: OS X protection vendor
On a mac, Most of the malware is installed by people who have no clue of what they're installing, especially those very well designed fake "websites" that look like a mac os X alert dialog box... It all starts with educating people on how to not fall in those dirty tricks...
User Rank: Apprentice
8/14/2015 | 7:23:54 PM
OS X protection vendor
There is a Boston based vendor called Confer that is doing a great job in detecting and preventing new unknow attacks on not only OS X but all endpoints. Anyone with an issue in this area should check them out.
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-25
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
PUBLISHED: 2021-02-25
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
PUBLISHED: 2021-02-25
The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.
PUBLISHED: 2021-02-25
A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter.
PUBLISHED: 2021-02-25
Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents.