Background In recent blog posts we’ve discussed vulnerabilities or flaws in macOS that allow malicious code to perform all sorts of nefarious actions such as: bypassing SIP, approving kernel extensions, dumping the keychain and much much more! However, exploiting these flaws all require that the malicious code has (somehow) already gained initial code-execution on the targeted system. In other words they are local attacks, which generally would be used in the 2nd-stage of an offensive cyber operation.
Imagine you’re an attacker (or piece of malware) that’s successfully just gained access to a Mac. Hooray!
You probably want to do things like:
Digita will additionally give away a select number of “SaveYourMac” t-shirts, like this one worn by our Chief Research Officer @patrickwardle as he slowly makes his way to speak at DefCon! 🐫 🤣
Patrick has always said he likes his tools open source! Follow along as he uncovers and analyzes an undetected cross-platform “Remote Administration Tool”, complete with tracing its origins to a github repository and a publicly available YouTube demo 😮
While the intent of the author, how the sample ended up on VT, and if users have ever been targeted are not known at this time, the features and capabilities of malware are certainly present.
More macOS malware! Once again tricking users into installing an infected application by leveraging a popular download site to gain trust. Read Patrick’s short blog post as he dissects the persistence mechanism for this cryptomining malware targeting macOS users.
Follow along with Patrick at 40,000ft as he dives deeper into the capabilities of macOS malware first reported by Lookout/EFF in their Dark Caracul analysis. Want to interactively play along with his breakdown? Objective-See has shared the malware, which can be downloaded here – password: infect3d.
(@patrickwardle) formally joins Digita Security as Co-Founder and Chief Research Officer Patrick is widely regarded as a top researcher in the fields of macOS security and malware analysis. He has been credited with numerous CVEs in core macOS components. Their subsequent fixes have improved macOS security for every user and have been rumored to have spawned a new phrase in Cupertino, “Getting Wardled”. This year Patrick’s research has been featured on CNN, Forbes, and the New York Times.
October 19th, 2017 Update: Apple has just silently pushed an updated XProtect configuration package that appears to address this issue. The package changes the receipt identifier that was the root cause of the problem. It does not change the configuration version number nor introduce any changes to XProtect rules. We’ve confirmed that previously ‘stuck’ machines are now updating properly. TLDR; High Sierra installer replaces XProtect config version 2095 with version 2094.
Welcome to the new Digita Security website. We are excited to start sharing our start-up journey. We hope you can tell from our new website launch that we have a passion for macOS, cyber-security, and product development. As long time Mac users and security professionals we recognize that we have a great opportunity to build native macOS security products. At Digita Security our primary goal is to improve the security of macOS users by developing high quality security products that are accessible to everybody.