Patrick Wardle, a researcher at Digita Security, has seemingly found a new version of the Remote Access Trojan (RAT) that was open sourced on GitHub in 2016. This RAT was remarkable since it was developed to target Apple's macOS, and is not detected to this day by antivirus engines.
Wardle describes on his blog how he tripped over the new version while looking at macOS's "privacy database" (TCC.db), which contains the list of applications that are afforded "accessibility" rights. Once in this database, a program can interact with system UIs, applications or even intercept key events -- i.e. keylogging.
Mac users may indirectly know of this database, since it was directly modified by initial versions of Dropbox without Dropbox ever telling the user it was doing so as it was supposed to. Apple Inc. (Nasdaq: AAPL) responded by system protecting the database to rain on Dropbox's parade.
Anyway, Wardle found a 1.3MB file called com.apple.audio.driver2.app that referenced the TCC.db. The fact that this file was of non-Apple origin despite its title was very suspicious. The fact that the file was not signed by Apple was another nail in the coffin.
The blog outlines the technical steps he took -- using mostly open sourced software, too! -- to figure out what was hiding in that file.
When he was done, he found the Coldroot RAT looking back at him. It wasn't just the older Coldroot, but one improving over the older version. Someone had seemingly taken it and added capabilities. This version could spawn new remote desktop sessions as well as take screen captures to generate a live stream of the victim's desktop.
Not only that it can start and kill processes on the target's system, as well as search, download, upload and execute files.
The malware does need to show an alert to the user that it is making changes, but once it has been given the OK -- perhaps by a novice user -- it will act silently.
The malware will persist by launching itself as a daemon with root status when the system comes up. And while the RAT tries to sneak itself into TCC.db, the effort will fail on newer versions of macOS thanks to Dropbox having previously forced Apple's hand on the file.
So, there is a publicly available RAT targeting macOS that has been upgraded with additional functionality. Running the fake driver name through VirusTotal as of this writing shows that only the ESET tool warns of it. All others give it a pass.
Users will need to be aware of this bogus driver and steer clear from it or anything that references it. AV engines do not yet understand the hidden RAT that possibly lies within their Macs.
- Apple & Cisco Look to Ease Burden of Cybersecurity Insurance
- New Intel Vulnerability Hits Almost Everyone
- Major Apple Flaw Found, Fixed & Still Dangerous
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.