'Dumb' malware targets MacOS devices

By on
'Dumb' malware targets MacOS devices

Attackers are targeting cryptocurrency users with a new malware designed for macOS by getting victims on Slack or Discord groups to infect themselves with a malicious script.

Posing as group administrators on cryptocurrency forums and discussion boards, the malicious actors are sharing a script, and encouraging users to copy and paste it into a Terminal window on their Macs, disguised as helpful advice.

The command, once entered, downloads a 34-megabyte payload from a remote server and grants backdoor access into the infected machine, according to Remco Verhoef from SANS, who first discovered the threat.

Later dubbed OSX.Dummy by Mac malware expert Patrick Wardle for a host of reasons, the infection is able to bypass Gatekeeper, an additional layer of security on macOS X, if enabled directly through terminal commands, despite the fact it is unsigned code - meaning it should, in theory, be immediately detected.

Among Wardle's observations, he noted "the infection method is dumb, the massive size of the binary is dumb, the persistence mechanism is lame (and thus also dumb)" and "the capabilities are rather limited (and thus rather dumb)".

Despite the malware being not particularly exceptional, according to Thomas Reed, Malwarebytes' director of Mac and mobile, the method of distributing is itself interesting, given how often people on forums have been giving instructions that involve running line-by-line terminal commands for years.

"There have been other cases in the past of scripts being posted that were actually malicious in nature," he wrote on the cyber security company's official blog.

"The most well known of these was an infamous trick where users were told to run the following command to cure whatever problem they were having: sudo rm -rf /. Unfortunately for users who actually followed directions like these, this command actually erases the hard drive.

"Thus, there's precedent for being suspicious of shell scripts posted online, yet even so, many people will still run highly suspicious scripts without a care. Readers are encouraged to educate users about the dangers of this behaviour at every opportunity."

The executable file also asks for a password when first run, which may be seen as normal sudo behaviour, but is actually the malware stealing the user's password, which it subsequently stores on small data files named 'dumpdummy' on the infected Macs.

This, according to Reed, poses a "serious security threat", and given the file itself is not malicious likely won't be detected by most, if any, antivirus software. Removing the infection therefore won't necessarily remove the 'dumpdummy' files.

The analysts involved have not yet been able to determine the attackers' aims, but, given the fact the malware grants an attacker the ability to execute command-line code as the root user and that cryptocurrency users are being targeted, they are likely to be motivated by cryptocurrency theft.

This article originally appeared at itpro.co.uk

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © ITPro, Dennis Publishing
Tags:

Most Read Articles

You must be a registered member of CRN to post a comment.
| Register

Poll

How's business been for you this year?
Business is up
Steady, nothing to report
Business has been down
View poll archive

Log In

Username / Email:
Password:
  |  Forgot your password?