Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

The mystery of a Mac malware called “FruitFly.”
Motherboard ^ | July 24, 2017 | By LORENZO FRANCESCHI-BICCHIERAI

Posted on 07/25/2017 12:13:58 AM PDT by Swordmaker

A mysterious piece of malware has been infecting hundreds of Mac computers for years—and no one noticed until a few months ago.

Earlier this year, an ex-NSA hacker started looking into a piece of malware he described to me as "unique" and "intriguing." It was a slightly different strain of a malware discovered on four computers earlier this year by security firm Malwarebytes, known as "FruitFly."

This first strain had researchers scratching their heads. On the surface, the malware seemed "simplistic." It was programmed mainly to surreptitiously monitor victims through their webcams, capture their screens, and log keystrokes. But, strangely, it went undetected since at least 2015. There was no indication of who could be behind it, and it contained "ancient" functions and "rudimentary" remote control capabilities, Malwarebytes's Thomas Reed wrote at the time.

The second version of FruitFly is even more puzzling, according to Patrick Wardle, the former spy agency hacker who now develops free security tools for Apple computers and researches Mac security for the firm Synack. Wardle told Motherboard in a phone call that when he first discovered FruitFly 2, no anti-virus software detected it. More surprisingly, it looks like it has been lurking around for five or 10 years and infected several hundred users.

FruitFly and FruitFly 2 are also mysterious: Neither Reed nor Wardle know its mechanism of infection—whether it takes advantage of a flaw in MacOS's code, is installed via social engineering, or some other way. For that reason, and because Apple didn't respond to several requests for comment, we're not sure if computers are still at risk. There may be more than just hundreds of victims because Malwarebytes had limited visibility into FruitFly 1, and Wardle said he likely saw only a portion of infected computers by FruitFly 2.

"This year we've seen more Mac malware than in any previous year."

While FruitFly itself isn't that sophisticated or advanced, its long, undisturbed life shows that despite the widespread belief that they are virus-free, Macs aren't immune from invasive and dangerous malware.

"This year we've seen more Mac malware than in any previous year," Reed, the researcher at Malwarebytes who first analyzed the other version of FruitFly, told Motherboard.

TAKING APART FRUITFLY

Frustrated by the long and tedious process of picking it apart —"analyzing malware is kind of a pain in the ass," he joked—Wardle figured he could just trick FruitFly 2 into telling him what it was after. He discovered that FruitFly 2 was programmed to send data back to the hacker or hackers controlling it—whoever they might be—through a series of backup servers in case the main ones were down. This turned out to be the case, so he registered these backup domains and infected his own virtual machine with FruitFly.

"I was quickly able to fully determine all the malware's capabilities by basically just asking it the right questions," Wardle said.

A partial list of FruitFly victims. (Image: Patrick Wardle)

Taking control of a command and control server, however, had another unexpected outcome: Around 400 victims infected with FruitFly started connecting to it. Wardle could have taken over those computers or spied on them if he wanted to. Instead, he warned law enforcement, which is investigating the case.

An FBI spokesperson told Motherboard that "as a matter of longstanding policy, the FBI neither confirms nor denies the existence of investigations." Reed told me that Apple told him after he reported FruitFly 1 that the FBI was investigating. Wardle said he couldn't discuss details of the investigation other than saying he contacted law enforcement. Apple did not respond to multiple requests for comment.

WHODUNNIT?

Neither Reed nor Wardle know how the malware got onto the victim computers. But the big mystery surrounding FruitFly is who is behind it.

The malware doesn't contain many clues, and it's not even clear what profile the hackers fit, according to both Wardle and Reed.

FruitFly doesn't seem made by a nation-state because it's not sophisticated enough, and it doesn't appear to be targeting high-profile victims.

Malwarebytes saw it in four computers belonging to research facilities, but the victims Wardle identified run the whole gamut. There's a few research facilities, but mostly it's average people, and 90 percent of them are from either US or Canada, according to Wardle.

"Just because they have a Mac, it doesn't mean that they're safe."

Despite targeting regular people, it doesn't seem to be made by people specifically interested in extorting victims with ransomware or stealing their credit cards and passwords. Wardle said that both versions of FruitFly seemed to be made mostly for surveillance. But FruitFly2they had unusual capabilities such as being able to move the mouse cursor and control the keyboard remotely, and it was programmed to alert the hackers when the computer's owner returns to control it, according to Wardle. It was also written in Perl, a language that's "archaic" for malware and used old code, Wardle said.

In other words, the hackers have probably been around for a while, and seem to be neither spies nor cybercriminals.

"[FruitFly] didn't fit any of those molds," Wardle said, adding that it seems like it's a "specific hacker targeting specific individuals" for unknown purposes.

While that shouldn't cause panic, Wardle said, it is "worrisome."

"If there are hackers out there who are specifically targeting families or individual Mac users, that kinda makes my stomach turn," he said. "People need to be really cautious when they use their computers, when their kids use their computers. Just because they have a Mac, it doesn't mean that they're safe."

Wardle is going to talk about FruitFly 2 at the upcoming Black Hat and Def Con conferences in Las Vegas this week.



TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; fruitfly; macmalware

1 posted on 07/25/2017 12:13:58 AM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; ...
Mysterious Mac Malware Has Infected Victims for Years — Fruitfly. I suspect that given the limited promulgation of this malware the most likely mode of infection is physical access to the Mac, not Phishing or any kind of Trojan, otherwise it would have been discovered long before now. — PING!


Apple Mac Malware That's Been Hiding Out For Years
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 07/25/2017 12:20:03 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Very very interesting. So how is implanted on the victim’s Mac?


3 posted on 07/25/2017 12:21:46 AM PDT by BullDog108 (A Smith & Wesson beats four aces!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BullDog108

How is IT implanted...


4 posted on 07/25/2017 12:22:14 AM PDT by BullDog108 (A Smith & Wesson beats four aces!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

This sounds very familiar. I read another article some month ago about a security researcher discovering a new trojan and he registered backup domains to trap all the other infected machines and learn more about what was going on. I wonder if this is a redux of that article, or a completely different type of malware.


5 posted on 07/25/2017 12:49:45 AM PDT by lefty-lie-spy (Stay metal. For the Horde \m/("_")\m/ - via iPhone from Tokyo.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Shouldn’t a “mac” attack be called a burgerfly?


6 posted on 07/25/2017 4:00:44 AM PDT by faucetman (Just the facts, ma'am, Just the facts)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

That screenshot of Fruitfly “victims” shows a lot of root accounts. How was the root account even activated as it is off by default on OS X, and activating it is non-trivial.


7 posted on 07/25/2017 4:04:41 AM PDT by Flick Lives (#CNNblackmail)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
FruitFly doesn't seem made by a nation-state because it's not sophisticated enough,

If it sat on a number of Macs for 5 to 10 years undetected, it is sophisticated enough.
8 posted on 07/25/2017 4:09:48 AM PDT by Dr. Sivana (There is no salvation in politics.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Interesting article. The part that strikes me is that the simplicity of the malware is the "beauty" of it. Difficult to determine who made it or why, or even how it got onto the "victims" computers in the first place. The simplicity appears to also be the reason why it went undetected for so long.

Still, "hundreds" of Mac's that are "infected" compared to the how many thousands or tens of thousands of Windows PC's that get infected with some form of malware on a daily basis seems small by comparison.

Now that I think about it, how do we know that "fruitfly" isn't an NSA created malware and these hundreds of Mac's aren't just a test bed?

9 posted on 07/25/2017 4:10:01 AM PDT by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dr. Sivana
If it sat on a number of Macs for 5 to 10 years undetected, it is sophisticated enough.

It most certainly is! Again, the simplicity of the malware appears to be the "beauty" of it.

10 posted on 07/25/2017 4:11:39 AM PDT by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

NSA, CIA, FBI


11 posted on 07/25/2017 5:26:01 AM PDT by VTenigma (The Democrat party is the party of the mathematically challenged)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Flick Lives; BullDog108
That screenshot of Fruitfly “victims” shows a lot of root accounts. How was the root account even activated as it is off by default on OS X, and activating it is non-trivial.

Up until last fall there was a means of accessing Root level with a Thunderbolt plug in device that bypassed passwords. A person with physical access to the computer need only plug in such an infected device and the payload could be uploaded and installed. As it mentions it is a simple load at startup file that is easily deleted if one knows where to find it in the System Library. . . however it does require physical access to the computer to plug in the Thunderbolt device. It takes just seconds to accomplish. Apple blocked this means of attack last year by pushing out a patch to all Macs that patched the firmware for the Thunderbolt hardware.

12 posted on 07/25/2017 10:49:36 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Flick Lives

Incidentally, on a Mac, the “admin” account is not a “Root” account. It is one level below Root. . . also there is now a super level root account on all Macs instituted with the change added by Apple requiring a additional password even above the Root password for certain changes to the System to prevent even the Root user from doing damage to certain directories.


13 posted on 07/25/2017 10:53:52 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Dr. Sivana
If it sat on a number of Macs for 5 to 10 years undetected, it is sophisticated enough.

No, it speaks of the users of those Macs lack of sophistication rather than the sophistication of the malware. . . and the lack of the malware's apparent intrusiveness. . . the users just did not notice it, nor did it make itself apparent by untoward activity.

14 posted on 07/25/2017 10:56:57 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

Where are Macs built again?


15 posted on 07/25/2017 10:58:11 AM PDT by dfwgator
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
No, it speaks of the users of those Macs lack of sophistication rather than the sophistication of the malware. . . and the lack of the malware's apparent intrusiveness. . . the users just did not notice it, nor did it make itself apparent by untoward activity.

Depending on the target, the sophistication of the users is irrelevant if we are going to have "personal" computers at all. In this case it mentioned a number of the users were "researchers". While they might not be UT researchers, they would likely have above average intelligence and understanding of how technology works. If the malware did what the malefactorous author(s) intended, it was sophisticated enough. Q.E.D.
16 posted on 07/25/2017 11:00:03 AM PDT by Dr. Sivana (There is no salvation in politics.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: VTenigma
NSA, CIA, FBI

As I said, "targeted" and "requiring physical access for installation" . . . screams of the three latter agencies, doesn't it? Why would be better to send an agent in to an office, lab, or home to install this malware?

17 posted on 07/25/2017 11:00:20 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dfwgator
Where are Macs built again?

Software is created and published in California, iMacs are assembled in Elk Grove, California, Mac Pros are manufactured in Austin, Texas, MacBooks are manufactured in various cities in China. . . but the software is again in California. So your obvious point is wrong. This malware exists not on every single Mac out in the wild but on a few specific Macs, installed after manufacture, by someone other than Apple.

18 posted on 07/25/2017 11:04:37 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Swordmaker

>> There’s a few research facilities, but mostly it’s average people....

That doesn’t mean that certain people weren’t targets. Sometimes a shotgun approach hits more than the target.

Just a possibility.


19 posted on 07/25/2017 10:10:50 PM PDT by generally ( Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 17 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson