Even though this is primarily in Europe and obtained by phishing I thought you
might want to be aware.
John
Gatekeeper won’t stop this ‘major scale’ Mac malware
Killian Bell <http://www.cultofmac.com/author/killian-bell/>7:41 am, April 28,
2017
The OSX/Dok malware forces you to install a bogus OS X update.
Image: Check Point
OSX/Dok, a new strain of “major scale” malware targeting macOS users, can
bypass the Gatekeeper feature that’s designed to block malicious software.
The newly identified trojan, which prevents you from doing anything on your Mac
until you install a bogus software update, also goes undetected by many
antivirus programs.
As the macOS user base grows, so does the malware that targets it. According to
McAfee Labs, malware attacks designed for Mac computers rose 744 percent in
2016
<http://www.cultofmac.com/475297/mcafee-report-reveals-mac-malware-skyrocketed-2016/>,
with almost 460,000 samples discovered. The latest is particularly worrisome.
Uncovered by security researches at Check Point
<http://blog.checkpoint.com/2017/04/27/osx-malware-catching-wants-read-https-traffic/>,
OSX/Dok can hit all versions of macOS and OS X. It wasn’t recognized by
antivirus databases when it was first discovered, and it is considered by be
the first “major scale malware” to target Mac users.
OSX/Dok malware targets all Macs
The most troublesome aspect of this malware? It is signed with a valid
developer certificate that’s been authenticated by Apple, which means macOS
doesn’t see it as a threat and it isn’t blocked by Gatekeeper. The certificate
is dated April 21, 2017.
“Once OSX/Dok infection is complete, the attackers gain complete access to all
victim communication, including communication encrypted by SSL,” explains Check
Point. “This is done by redirecting victim traffic through a malicious proxy
server.”
The malware is being distributed primarily in Europe via phishing emails that
encourage users to download a file that details supposed inconsistencies in
their tax returns. That file is named “Dokument.zip” when distributed among
users in Germany.
How OSX/Dok Mac malware works
When you open it, the malware copies itself to the /Users/Shared folder, then
proceeds to execute itself automatically. It also removes any trace of the
original download from the Downloads folder, and presents an error message that
hopes to convince users the file “could not be opened.”
Little do they know that the malware has added itself as a Login Item with the
name “AppStore,” which runs automatically when they first start up their Macs.
It will continue to execute every time an infected Mac is started up until it
has successfully installed its payload.
“The malicious application will then create a window on top of all other
windows. This new window contains a message, claiming a security issue has been
identified in the operating system that an update is available, and that to
proceed with the update, the user has to enter a password.”
Once you have received this popup, you cannot do anything with your Mac until
you agree to install the bogus update. And of course, entering your password
provides the malware with administrator privileges and it can continue the next
phase of its assault.
That includes installing a package manager that downloads and installs
additional tools, and providing the existing user account with admin privileges
immediately without the need to enter a password. It also alters network
settings to ensure all outgoing connections pass through a proxy.
What OSX/Dok Mac trojan does
Of course, that proxy sits on a malicious server on the “dark web,” and every
piece of data that passes through it gets collected.
“As a result of all of the above actions, when attempting to surf the web, the
user’s web browser will first ask the attacker web page on TOR for proxy
settings,” Check Point says.
“The user traffic is then redirected through a proxy controlled by the
attacker, who carries out a Man-In-the-Middle attack and impersonates the
various sites the user attempts to surf. The attacker is free to read the
victim’s traffic and tamper with it in any way they please.”
Once the attacker has obtained the information they want, the malware will
remove itself from the infected machine. The user has no idea what was going on
in the background until it’s too late.
Via: The Hacker News <http://thehackernews.com/2017/04/apple-mac-malware.html>
_______________________________________________
MacGroup mailing list
Posting address: [email protected]
Archive: <http://www.mail-archive.com/[email protected]/>
Answers to questions: <http://erdos.math.louisville.edu/macgroup/>