{"id":7946,"date":"2017-06-14T08:10:30","date_gmt":"2017-06-14T16:10:30","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/14\/news-1727\/"},"modified":"2017-06-14T08:10:30","modified_gmt":"2017-06-14T16:10:30","slug":"news-1727","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/14\/news-1727\/","title":{"rendered":"New Mac Malware-as-a-Service offerings"},"content":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Wed, 14 Jun 2017 15:00:01 +0000<\/strong><\/p>\n<p>A\u00a0couple weeks ago, two new Malware-as-a-Service (MaaS) offerings for the Mac became\u00a0available. These two offerings &#8211; a backdoor named MacSpy and a ransomware app named MacRansom &#8211; were <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/macransom-and-macspy-malware-as-a-service-portals-put-mac-users-on-alert\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovered by Catalin Cimpanu<\/a> of Bleeping Computer on May 25.<\/p>\n<p>Cimpanu evidently had some trouble getting hold of samples, but on Friday\u00a0<a href=\"https:\/\/blog.fortinet.com\/2017\/06\/09\/macransom-offered-as-ransomware-as-a-service?cn=bWVzc2FnZQ\" target=\"_blank\" rel=\"noopener noreferrer\">analysis of\u00a0MacRansom<\/a> was posted by Fortinet and <a href=\"https:\/\/www.alienvault.com\/blogs\/labs-research\/macspy-os-x-rat-as-a-service\" target=\"_blank\" rel=\"noopener noreferrer\">analysis of MacSpy<\/a> was posted by AlienVault.<\/p>\n<p>Both of these malware programs were advertised through Tor websites, claiming them to be &#8220;The most sophisticated Mac spyware\/ransomware ever, for free.&#8221; Neither programs were directly available, but could only be obtained by emailing the authors at protonmail[dot]com email addresses.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-website.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-18301\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-website-600x450.png\" alt=\"\" width=\"600\" height=\"450\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-website-600x450.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-website-300x225.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<h3>Behavior<\/h3>\n<p>Despite the claims of sophistication, these malware programs are not particularly advanced. The programs provided to both Fortinet and AlienSpy were simple command-line executable files that, when run, copy themselves into the user&#8217;s Library folder.<\/p>\n<p><strong>MacSpy:<\/strong><\/p>\n<pre>~\/Library\/.DS_Stores\/updated<\/pre>\n<p><strong>MacRansom:<\/strong><\/p>\n<pre>~\/Library\/.FS_Store<\/pre>\n<p>Because the .DS_Stores folder and the .FS_Store file both have names starting with a period, they are hidden from view\u00a0unless the user has done something to show invisible files.<\/p>\n<p>As part of the installation, these programs\u00a0also create LaunchAgent files for persistence &#8211; a not at all original method.<\/p>\n<p><strong>MacSpy:<\/strong><\/p>\n<pre>~\/Library\/LaunchAgents\/com.apple.webkit.plist<\/pre>\n<p><strong>MacRansom:<\/strong><\/p>\n<pre>~\/Library\/LaunchAgents\/com.apple.finder.plist<\/pre>\n<p>Some recent malware has had the capability to customize the install locations and names, but there&#8217;s no indication in the reports from Fortinet and AlienVault that such a feature is available in MacSpy or MacRansom, making these quite easy to detect.<\/p>\n<p>MacRansom is created with a custom &#8220;trigger date,&#8221; after\u00a0which time the malware detonates and encrypts the files in the user&#8217;s home folder, as well as on any connected volumes, such as external hard drives. As happened with KeRanger, which had a 3-day delay before encrypting, this delay will likely mean that few people who are using security software will actually be affected, as the malware will probably be detected before it encrypts anything.<\/p>\n<p>Further, the encryption uses a symmetric key &#8211; meaning that the same key is used both to encrypt and to decrypt &#8211; that is only 8 bytes in length, making it rather weak and relatively easy to decrypt. However, the key creation process involves a random number and the resulting key\u00a0is apparently not saved to the hard drive or communicated back to the authors in any way, making it impossible to decrypt the files except via brute force.<\/p>\n<p>After encryption, the malware will display a pop-up alert informing the user of what must be done to decrypt the files, and will continue to reappear even if the user clicks the &#8220;Destroy [sic] My Mac&#8221; button.\u00a0The malware does not save any copies of that information to files on the hard drive, as is typical of most ransomware.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-warning.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-18302\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-warning-300x159.png\" alt=\"\" width=\"300\" height=\"159\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-warning-300x159.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-warning-600x318.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/MacRansom-warning.png 719w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>MacSpy is fairly simple spyware, which gathers data into temporary files and sends those files periodically back to a Tor command &amp; control (C&amp;C) server via unencrypted http. It will exfiltrate the following data:<\/p>\n<ul>\n<li>Screenshots (taken every 30 seconds)<\/li>\n<li>Audio captured via microphone<\/li>\n<li>Keystrokes*<\/li>\n<li>Clipboard contents<\/li>\n<li>iCloud photos<\/li>\n<li>Browser data<\/li>\n<\/ul>\n<p>In the case of keylogging, the malware requires an admin password, which can be provided in the email requesting a copy of the malware. This requires that the attacker\u00a0knows the password for\u00a0the target Mac in advance.<\/p>\n<p>If the attacker pays for the malware, they will get additional capabilities, such as more general file exfiltration, access to social media, help with packaging the executable into a Trojan form (such as a fake image file), and code signing.<\/p>\n<h3>Analysis avoidance<\/h3>\n<p>Although neither of these programs is particularly sophisticated, they both do include some reasonably effective analysis avoidance features. Both include three methods for determining whether they are being analyzed by a researcher, in which case they shut down and do not display their malicious behaviors.<\/p>\n<p>First, they will check to see if they are being run by\u00a0a debugger, using a call to ptrace.<\/p>\n<p>They will also parse the output from the shell command <em>sysctl hw.model<\/em> for the word &#8220;Mac&#8221;, terminating if that is not found. In a virtual machine, this command will not return the model identifier for the hardware, but will instead return a value specific to the virtualization software being used. Thus, if the output does not contain &#8220;Mac,&#8221; it is most likely being run in a virtual machine, and the most likely reason for that is that it&#8217;s being analyzed by a security researcher.<\/p>\n<p>Another virtual machine check that is performed is a check for the number of logical and physical CPUs. Since the number of CPUs is simulated in a virtual machine, this is another fairly reliable indicator that the malware is under\u00a0analysis.<\/p>\n<p>If any of these checks fail, the malware terminates.<\/p>\n<p>Fortunately, because the malware isn&#8217;t signed, it&#8217;s possible to hack the executables to bypass these anti-analysis checks and then analyze it in a virtual machine.<\/p>\n<h3>About the authors<\/h3>\n<p>The websites for the malware include an &#8220;About Us&#8221; section, in which the authors provide some information about their motivations:<\/p>\n<blockquote>\n<p>We are engineers at Yahoo and Facebook. During our years as security researchers we found that there lacks sophisticated malware for Mac users. As Apple products gain popularity in recent years, according to our survey data, more people are switching to MacOS than ever before. We believed people were in need of such programs on MacOS, so we made these tools available for free. Unlike most hackers on the darknet, we are professional developers with extensive experience in software development and vast interest in surveillance. You can depend on our software as billions of users world-wide rely on our clearnet products.<\/p>\n<\/blockquote>\n<p>I suspect that a lot of this is probably not accurate. I seriously doubt that they would really give away information about their former employers, which would provide a clue that could be used to help track them down and could be used as evidence in a trial. Further, as a security professional myself, it&#8217;s rather laughable that the best a security researcher could do for persistence is a launch agent.<\/p>\n<p>Also, the lack of any way to decrypt files in a ransomware app is extremely amateurish.\u00a0This means that 2\/3 of the Mac ransomware that has ever existed has had no means for decrypting files so\u00a0that users who pay will get none of their data back\u00a0in return.\u00a0Hopefully, this will make victims of future Mac ransomware\u00a0reluctant to pay, which\u00a0will, in turn, make it unprofitable to develop such malware\u00a0in the future.<\/p>\n<p>All these factors mean that these hackers undoubtedly do not have the qualifications they claim to have and are actually amateur developers with a tendency towards crime.<\/p>\n<h3>Disinfection<\/h3>\n<p>The presence of any of the following items\u00a0is an indicator of infection:<\/p>\n<pre>~\/Library\/LaunchAgents\/com.apple.webkit.plist  ~\/Library\/LaunchAgents\/com.apple.finder.plist  ~\/Library\/.DS_Stores\/  ~\/Library\/.FS_Store<\/pre>\n<p><a href=\"https:\/\/malwarebytes.com\/mac\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes for Mac<\/a> will detect these as OSX.MacSpy and OSX.MacRansom.<\/p>\n<p>If you were infected with MacSpy, after removing it, you should be sure to change all your\u00a0passwords, as they might have been compromised by the keylogging, screen captures and\/or clipboard exfiltration. If your work computer has been compromised, contact your IT department to alert them to the issue; otherwise, your accounts or other information leaked could potentially give a criminal inside access to your company&#8217;s servers.<\/p>\n<p>If you had a MacRansom infection and didn&#8217;t get your data encrypted, consider yourself very lucky. Start backing up your computer regularly if you didn&#8217;t already and avoid leaving the backup drive connected all the time.<\/p>\n<p>If you did have data encrypted by the ransomware, it&#8217;s possible that it could be decrypted by an expert in cryptography. Although we don&#8217;t currently have information about decrypting such files, we will update this article in the future if a method for doing so is identified.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/06\/new-mac-malware-as-a-service-offerings\/\">New Mac Malware-as-a-Service offerings<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/06\/new-mac-malware-as-a-service-offerings\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Wed, 14 Jun 2017 15:00:01 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/06\/new-mac-malware-as-a-service-offerings\/' title='New Mac Malware-as-a-Service offerings'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/shutterstock_642718216.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A couple weeks ago, two new Malware-as-a-Service (MaaS) offerings for the Mac became available. We take a closer look at these two offerings &#8211; a backdoor named MacSpy and a ransomware app named MacRansom.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/anti-malware-for-mac\/\" rel=\"tag\">anti-malware for Mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bleeping-computer\/\" rel=\"tag\">Bleeping Computer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/catalin-cimpanu\/\" rel=\"tag\">Catalin Cimpanu<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/maas\/\" rel=\"tag\">MaaS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac\/\" rel=\"tag\">mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macransom\/\" rel=\"tag\">MacRansom<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macspy\/\" rel=\"tag\">MacSpy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware-as-a-service\/\" rel=\"tag\">Malware-as-a-Service<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/06\/new-mac-malware-as-a-service-offerings\/' title='New Mac Malware-as-a-Service offerings'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/06\/new-mac-malware-as-a-service-offerings\/\">New Mac Malware-as-a-Service offerings<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12635,2211,12246,12636,12637,10454,12638,12639,3764,12640,10546,3765],"class_list":["post-7946","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-anti-malware-for-mac","tag-apple","tag-bleeping-computer","tag-catalin-cimpanu","tag-maas","tag-mac","tag-macransom","tag-macspy","tag-malware","tag-malware-as-a-service","tag-malwarebytes-news","tag-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7946"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7946\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7946"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}