Tuesday, March 4, 2025
HomeMalwareRunning OSX relatively safe? New Malware strains targeting all versions of MacOSX...

Running OSX relatively safe? New Malware strains targeting all versions of MacOSX clients

Published on

SIEM as a Service

Follow Us on Google News

People regularly anticipate that in case you’re strolling OSX, you’re highly secure from malware. But that is turning into much less and less real, as evidenced via brand new strain of malware encountered with the aid of the Check Point research team.

Checkpoint said This new malware – dubbed OSX/Dok — influences all versions of OSX, has zero detections on VirusTotal (as of the writing of these words), is signed with a legitimate developer certificate (authenticated by means of Apple), and is the primary fundamental scale malware to target OSX users thru a coordinated email phishing campaign.

The Malware strain discovered by checkpoint researchers targeting OSX users mostly in European countries.

For instance, one phishing message turned into determined to target a person in Germany by using baiting the user with a message regarding supposed inconsistencies of their tax returns (see image, and translation, under).

 Malware strains targeting all versions of MacOSX
Source: checkpoint
Attackers get whole access to all information exchange, such as communique encrypted by means of SSL. This is done by means of redirecting victim traffic thru a malicious proxy server.

Malware Execution

The malware package consists of a.Zip archive named Dokument.Zip. It became signed on April 21th, 2017 via a “Seven Muller” and the package name is Truesteer.AppStore.

Once executed it moves to Users/Shared/ folder and then ready to execute from different locations.

Malware strains targeting all versions of MacOSX
Source: checkpoint

It will show a message the package is damaged and cannot execute.If a loginItem named “AppStore” exists, the malware will delete it, and as a substitute add itself as a loginItem, to be able to persist within the device and execute routinely each time the device reboots.

It will do the same process until payload installation successfully completed.And then it will pop up a window asking to update and try to get user’s credentials.

The victim is barred from gaining access to any windows or the usage of their system in any manner until they relent, enter the password and permit the malware to finish installing.

Then it will install additional tools like TOR(used to connect dark web) and SOCAT(multipurpose relay).

The malware then modifies the victim machine’s network settings such that every one outgoing connection will bypass thru a proxy, that is dynamically acquired from a Proxy AutoConfiguration (PAC) document sitting on a malicious server.

Then after that, it will install a bogus certificate on the victim machine to launch an MITM attack to impersonate any websites.

security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /tmp/cert.der

Malware strains targeting all versions of MacOSX
Source: checkpoint

Launch Agents

/Users/training/Library/LaunchAgents/com.apple.Safari.proxy.plist
/Users/training/Library/LaunchAgents/com.apple.Safari.proxy.pac

As an end result of all of the above actions, whilst trying to surf the net, the consumer’s web browser will first ask the attacker web page on TOR for proxy settings.

The consumer traffic is then redirected through a proxy managed via the attacker, who consists of out a Man-In-the-Middle assault and impersonates the diverse websites the user tries to surf.

The attacker is free to study the victim’s visitors and tamper with it in any way they like.When achieved, the malware will delete itself.

Checkpoint alerts users to beware of Trojans bearing gifts, especially if they ask for your root password.Sample hash – 7819ae7d72fa045baa77e9c8e063a69df439146b27f9c3bb10aef52dcc77c1454131d4737fe8dfe66d407bfd0a0df18a4a77b89347471cc012da8efc93c661a5

Also Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...