Piratkopieret software til MacOS leveres med malware

The researchers found a campaign targeting macOS users when software for the operating system comes with malware. Attackers attack users with malicious versions of software, including Final Cut Pro, which is practically undetectable by antiviruses.

The malicious variant is distributed via torrents and contains the XMRig miner, which mines the Monero cryptocurrency on victimsmachines.

Lad mig minde dig om, at vi også skrev det Det macOS update provoked a panic of video editors in Hollywood, og også det Vulnerability in iOS and macOS Allowed Eavesdropping on Siri Conversations.

The problem was identified by Jamf Threat Labs, who traced it back to malicious torrents posted on The Pirate Bay by user wtfisthat34698409672. It is noted that since 2019, this user has published other applications for macOS, including Adobe Photoshop and Logic Pro X, all of which contained a cryptocurrency mining payload.

software til macOS med malware

A deeper analysis of these attacks led the researchers to the conclusion that the malware has already gone through three stages of development, and each time the operators of this campaign used more sophisticated methods to evade detection. Interestingly, security solutions consistently detect only the first generation of this threat, which stopped spreading back in April 2021.

software til macOS med malware

Experts write that starting from the first generation, this malware uses i2p (Invisible Internet Project) to communicate with C&C servers and anonymize traffic. This functionality is still relevant for all versions of malware.

The second generation of malware was used for a relatively short time, between April 2021 and October 2021, and used base 64 for executable files hidden in applications.

The third generation appeared in October 2021. Since May 2022, it has become the only and main distributed option. The great thing about this version is that it can disguise its malicious processes as system processes in Spotlight to avoid detection.

software til macOS med malware
Attack scheme

Ud over, the latest version contains a special script that constantly monitors the Activity Monitor, and if it is running, the malware immediately terminates all its processes in order to remain hidden from the user.

macOS Ventura uses more stringent code signing checks, which can make hiding and running malware through user-launched apps, especially pirated ones, inefficient.

I dette tilfælde, the attackers modified Final Cut Pro only partially, keeping the original code signing certificate intact, but Ventura still invalidated it because it detected changes in the software.

På den anden side, macOS Ventura did not prevent the miner from running. By the time the user receives the error message, the malware will already be installed.the researchers note.

An Apple spokesperson says that this particular malware is already under their watch, and the company is already working on updates in XProtect to effectively block it (including the specific variants listed in the Jamf Threat Labs report).

Let me remind you that information security specialists also talked about the fact that Vulnerability allows reading encrypted Apple Mail letters on macOS.

Om forfatteren

Carina Wilson

Med over 10 års erfaring med at skrive til online og trykte medier, Jeg er ekspert i at levere klar og overbevisende kopi.

Jeg har skrevet for et førende SEO copywriting bureau samt skrevet for nogle af Storbritanniens bedst kendte brands, magasiner og aviser.

Efterlad en kommentar