Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Another Mac-specific malware pops up, but Apple's Gatekeeper still prevents infection
AppleInsider ^ | Thursday, July 07, 2016, 12:50 pm PT | By Mike Wuerthele

Posted on 07/08/2016 4:35:02 PM PDT by Swordmaker

A second piece of Mac-specific malware has been discovered this week, one that could expose the passwords stored in the macOS Keychain. But once again, Apple's Gatekeeper security — when properly configured — will block the attack from succeeding.


Researchers at security firm ESET have been examining a new strain of OS X malware from an unknown source, and have published a breakdown of the so-called "OSX/Keydnap" package.

The malware is distributed as a .zip compressed archive, containing the package disguised as a text file or JPG graphic with accompanying icon. However, the file name has a trailing space, which by default, opens the Mach-O executable in the macOS Terminal.

After a double-click on the file, the Terminal icon appears in the dock, and very quickly closes. At this point, if Gatekeeper is active, the security mechanism pops up a warning to the user, saying that the file is from an unidentified developer, and prevents the launch.

If Gatekeeper has been configured by the user to execute all software regardless of source, the malware then downloads and runs the backdoor component which is executed at every reboot, replaces the Mach-O executable that the user clicked on with a decoy graphic or text file, and opens the decoy document in Preview.


The malware will seek root access, by waiting until another application launches, and popping up a dialog for user credentials.

After being granted root access, OSX/Keydnap can then be used by the owners of the a command and control server to hunt down the decryption key for the user's Keychain, and upload the stored passwords. Keychain-stored passwords include system passwords, as well as login information for Internet-based services, such as banking credentials, Gmail passwords, Amazon login information, and others.

To supplement Gatekeeper, an Internet connection monitoring application like Little Snitch can be used to examine incoming and outgoing Internet transmissions, and block undesirable ones, such as the download of the malware component in this case. Utilities similar to BlockBlock can continuously monitor for installation of persistent components vital for malware installers.

The revelation of the OSX/Keydnap package is the second Mac malware reveal in a week. On July 6, Backdoor.Mac.Eleanor was exposed, and is also easily preventable with properly configured Apple-provided security software, or by user awareness of the attack vector. AppleInsider was not able to obtain a sample of the malware to see if Apple's Xprotect has been updated.

The researchers at ESET note that they have no idea how the malware is spread, but spam email attachments are likely. Additionally, they have no count of active infections. Decoy images found during research point to the possibility of security researchers being a target of the malware.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; gatekeeper; malware

1 posted on 07/08/2016 4:35:02 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; ...
Another innocuous Apple OS X malware that is already recognized by OS X's own built in anti-malware protection. . . meaning that only industrial strength stupid users will get infected by it. OSX/Keydnap is built on an already existing Trojan so it is already in the Gatekeeper protection built into all Macs. — PING!


Apple Security
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 07/08/2016 4:38:44 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
If Gatekeeper has been configured by the user to execute all software regardless of source, the malware then downloads and runs the backdoor component which is executed at every reboot, replaces the Mach-O executable that the user clicked on with a decoy graphic or text file, and opens the decoy document in Preview.

OK. How do you know if Gatekeeper has been configured properly so this does not occur?

3 posted on 07/08/2016 4:45:14 PM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chgogal

Thank you, I have the same question.


4 posted on 07/08/2016 4:50:01 PM PDT by rdl6989
[ Post Reply | Private Reply | To 3 | View Replies]

To: Chgogal

And I found this in answer to our question.

https://support.apple.com/en-us/HT202491


5 posted on 07/08/2016 4:51:11 PM PDT by rdl6989
[ Post Reply | Private Reply | To 3 | View Replies]

To: rdl6989
Thanks, my Gatekeeper is in good shape. It came with my upgrade. The author wrote the article implying that the owner had to download Gatekeeper which I never did.
6 posted on 07/08/2016 4:58:40 PM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 5 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson