sb-nz logo
Story image

10 times malware proved that MacOS isn't bulletproof

08 Jul 2019

In the first six months of 2019 there have been at least ten types of malware specifically targeting macOS, indicating that Mac users need to come to terms with the fact that their devices are not immune from attack.

According to security firm SentinelOne’s Phil Stokes, cybercriminals are targeting Apple’s Mac platform more often – and they’re exploiting it.

SentinelOne’s Phil Stokes explains ten malware outbreaks in 2019:

1.    OSX.DOK: This installs a hidden version of the Tor browser and other tools designed to steal user data, capture the traffic, and enable stealth communication. It is delivered via a phishing campaign and it’s able to read all internet traffic, even encrypted traffic.

2.    CookieMiner: This malware doubles as a cryptominer and backdoor. If it infects a user’s machine, it can steal cryptocurrency account details and possibly steal user’s funds.

3.    Lazarus malware: An oldie but a persistent threat, Lazarus malware enables attackers to take total control of a device. They use a backdoor linked to a command-and-control server to take over the device.

4.    OSX.Pirrit: This is an adware and browser hijacker that makes money off infected users’ internet searches. It redirects users to dodgy websites, and me be able to steal data and spy on users.

5.    OSX.Siggen: This is a malware delivered through a fake WhatsApp app. Attackers can take control of the device through a backdoor.

6.    OSX.Loudminer: This is generally delivered through downloads of ‘cracked’ audio software, including Ableton Live. It will then take over a user’s computer to conduct cryptomining activities.

7.    KeyStealDaemon: This malware leverages a now-patched zero-day that could still infect users who don’t keep their operating system up to date. The malware can steal passwords.

8.    OSX/Linker: This makes use of another zero-day, which Apple hasn’t yet patched. It is delivered through fake Adobe Flash Player installers.  Attackers can truck users into mounting a malicious disk image, which they can use to execute malicious codes.

9.    OSX-Mokes and OSX.Netwire/Wirenet:  These mimic legitimate names such as ‘Dropbox’, ‘Chrome’ and ‘Firefox’ to avoid detection. Attackers can create a backdoor that can take screenshots, record keystrokes, and steal user data.

10.    OSX/CrescentCore: This is a dropper that tries to monetise downloads and browser searches on an infected machine through the likes of scareware, bloatware, and search hijack software. “The problem with these PUPs and adware installers is that they eventually grind the user’s machine to a halt with all the unnecessary tasks they run, as well as harm productivity as users are distracted by unwanted browser pages, popups and fake virus alerts.

Mac users should not believe the myth that Mac is bulletproof against cyber attacks.

“As cybercriminals are always looking for the weakest link, you should ensure all your macOS users, even if they are executives, developers or other power users, do not fall into that bucket,” Stokes concludes.

Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Dell Technologies unveils new data protection innovations for hybrid cloud workloads
The Dell EMC PowerProtect Backup Service, powered by Druva, is designed to deliver SaaS app protection without increasing IT complexity.More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
Identity in the age of eKYC & digital onboarding journeys
When an onboarding process is architected correctly, there are tangible benefits for customer satisfaction.More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More