Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/26/2019
06:30 PM
50%
50%

Malware Coming to a Mac Near You? Yes, Say Security Firms

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

Malware targeting Apple's Mac operating system accounted for two of the 10 most popular attacks in the first quarter of the year — the first time Apple's software took more than a single slot, according to network-security firm WatchGuard Technologies' quarterly threat report.

While Mimikatz, a credential-stealing tool used by penetration testers and attackers alike, topped the list with 3.7 million detections, a Mac-focused adware dropper was the fifth most detected malware with 300,000 detections, according to data collected from the network devices of WatchGuard customers who opt into anonymized data collection. A Mac Trojan horse claimed a spot as the ninth most detected malware.

Attackers will likely increase their focus on the operating system, but the platform is still far from a popular target, says Corey Nachreiner, chief technology officer at WatchGuard Technologies. Currently, only 3% of WatchGuard's network devices encountered malware targeting Mac OS.

"I don't think they would invest in Mac malware too much unless they were getting a return," Nachreiner says. 

WatchGuard is not the only company to see an increase in malware tailored to the Mac OS. Security-software firm Malwarebyte noted an increase in Mac malware, detecting some 16 million instances in just April, four times more than the previous monthly record over the past year.

"The data does indicate there is a rise in the prevalence of threats," says Thomas Reed, director of Mac and mobile at Malwarebytes, adding that the rise is likely connected to increasing popularity. "Some recent informal polls I've seen on Twitter indicate that Mac market share has grown to more than 30% in certain markets, and those are often the markets malware authors would most like to target."

For the most part, adware is driving the increase. WatchGuard noted that the most detected Mac malware program installed adware. For Malwarebytes, potentially unwanted programs (PUPs) accounted for the largest category of Mac detections, followed by adware.  

The increase in Mac malware could pose a problem for Apple's user base, both companies stressed. While Windows is still a far more targeted operating system, Macs are often softer targets, says Malwarebytes' Reed.

"Mac does have some nice security features, but they're fairly easy to bypass," he says. "Between wider adoption and relative ease of infection, Macs are growing in popularity as a target."

Historically, Apple and its base have assumed a reduced number of attacks against the platform, and that leaves them unprepared, WatchGuard's Nachreiner says.

"I would say that not only are we hitting the market inflection point where attackers are targeting the platform, but you add to that the weakness that Mac users tend to be less focused on security," he says. "While Apple does work hard — they do a lot of things with Gatekeeper [Apple's program for ensuring only legitimate apps are installed] and work to keep it out of the user's view — it does have issues."

Because Apple's platform, by default, often has more strict security settings that result in less subtle attacks, the malware that impacts the Mac OS is often different from the more common Windows strains, Nachreiner says.

"It is possible to have more Mac malware, but to get it on your system, you need to convince the user to do something," he says, "whereas with Windows software, it's silent, so you can get infected and not even know it. While we have seen Mac malware, we have not seen a vulnerability be exploited in Mac software in the same way as on Windows."

While exploits have rarely been the way attackers have compromised Macs, a recent exploit does allow attackers to bypass GateKeeper's security checks

Microsoft Office exploits, however, have become a major threat. Almost 18% of all WatchGuard customers in its data feed program encountered an exploit for Microsoft Office in the first quarter. In addition, more than 95% of companies received at least two different exploits.

While malware detections increased in the first quarter of the year, network attacks decreased to 990,000 detections, down from 1.2 million, according to the quarterly threat report. An attack that uses a component from the popular penetration tool Metasploit reached into the top 10 for the first time. Most of the other attacks are standard fare from the OWASP Top 10 list, including remote file inclusion, cross-site scripting, SQL injection, and various credential-stuffing attacks.

Related Content

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-35519
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel i...
CVE-2021-20204
PUBLISHED: 2021-05-06
A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbi...
CVE-2021-30473
PUBLISHED: 2021-05-06
aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
CVE-2021-32030
PUBLISHED: 2021-05-06
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_chec...
CVE-2021-22209
PUBLISHED: 2021-05-06
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.