{"id":18215,"date":"2022-02-07T10:45:05","date_gmt":"2022-02-07T18:45:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/07\/news-11948\/"},"modified":"2022-02-07T10:45:05","modified_gmt":"2022-02-07T18:45:05","slug":"news-11948","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/07\/news-11948\/","title":{"rendered":"An Insidious Mac Malware Is Growing More Sophisticated"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61fdceeb808412610f9e4ca2\/master\/pass\/Security-Mac-Malware-1235461684.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Mon, 07 Feb 2022 14:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Mac malware known<\/span> as UpdateAgent has been spreading for more than a year, and it is growing increasingly malevolent as its developers add new bells and whistles. The additions include the pushing of an aggressive second-stage adware payload that installs a persistent backdoor on infected Macs.<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/mac-malware-spreading-for-14-months-is-growing-increasingly-aggressive\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/mac-malware-spreading-for-14-months-is-growing-increasingly-aggressive\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/mac-malware-spreading-for-14-months-is-growing-increasingly-aggressive\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\">The UpdateAgent malware family began circulating no later than November or December 2020 as a relatively basic information-stealer. It collected product names, version numbers, and other basic system information. Its methods of persistence\u2014that is, the ability to run each time a <a href=\"https:\/\/www.wired.com\/tag\/mac\/\">Mac<\/a> boots\u2014were also fairly rudimentary.<\/p>\n<p class=\"paywall\">Over time, <a data-offer-url=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/02\/the-evolution-of-a-mac-trojan-updateagents-progression\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/02\/the-evolution-of-a-mac-trojan-updateagents-progression\/&quot;}\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/02\/the-evolution-of-a-mac-trojan-updateagents-progression\/\" rel=\"nofollow\" target=\"_blank\">Microsoft said<\/a> on Wednesday, UpdateAgent has grown increasingly advanced. Besides the data sent to the attacker server, the app also sends \u201cheartbeats\u201d that let attackers know if the <a href=\"https:\/\/www.wired.com\/tag\/malware\/\">malware<\/a> is still running. It also installs adware known as Adload.<\/p>\n<p class=\"paywall\">Microsoft researchers wrote:<\/p>\n<p class=\"paywall\"><em>Once adware is installed, it uses ad injection software and techniques to intercept a device\u2019s online communications and redirect users\u2019 traffic through the adware operators\u2019 servers, injecting advertisements and promotions into webpages and search results. More specifically, Adload leverages a Person-in-The-Middle (PiTM) attack by installing a web proxy to hijack search engine results and inject advertisements into webpages, thereby siphoning ad revenue from official website holders to the adware operators.<\/em><\/p>\n<p class=\"paywall\"><em>Adload is also an unusually persistent strain of adware. It is capable of opening a backdoor to download and install other adware and payloads in addition to harvesting system information that is sent to the attackers\u2019 C2 servers. Considering both UpdateAgent and Adload have the ability to install additional payloads, attackers can leverage either or both of these vectors to potentially deliver more dangerous threats to target systems in future campaigns.<\/em><\/p>\n<p class=\"paywall\">Before installing the adware, UpdateAgent now removes a flag that a <a href=\"https:\/\/www.wired.com\/tag\/macos\/\">macOS<\/a> security mechanism called <a data-offer-url=\"https:\/\/support.apple.com\/en-us\/HT202491\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-us\/HT202491&quot;}\" href=\"https:\/\/support.apple.com\/en-us\/HT202491\" rel=\"nofollow noopener\" target=\"_blank\">Gatekeeper<\/a> adds to downloaded files. (Gatekeeper ensures users receive a warning that new software comes from the internet, and it also ensures the software doesn\u2019t match known malware strains.) While this malicious capability isn\u2019t novel\u2014<a data-offer-url=\"https:\/\/objective-see.com\/blog\/blog_0x1F.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/objective-see.com\/blog\/blog_0x1F.html&quot;}\" href=\"https:\/\/objective-see.com\/blog\/blog_0x1F.html\" rel=\"nofollow noopener\" target=\"_blank\">Mac malware from 2017<\/a> did the same thing\u2014its incorporation into UpdateAgent indicates the malware is under regular development.<\/p>\n<p class=\"paywall\">UpdateAgent\u2019s reconnaissance has been expanded to collect <a data-offer-url=\"https:\/\/discussions.apple.com\/thread\/2414242\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/discussions.apple.com\/thread\/2414242&quot;}\" href=\"https:\/\/discussions.apple.com\/thread\/2414242\" rel=\"nofollow noopener\" target=\"_blank\">system profile<\/a> and <a data-offer-url=\"https:\/\/stackoverflow.com\/questions\/8058151\/how-does-system-profiler-retrieve-the-full-mac-hardware-identifier\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/stackoverflow.com\/questions\/8058151\/how-does-system-profiler-retrieve-the-full-mac-hardware-identifier&quot;}\" href=\"https:\/\/stackoverflow.com\/questions\/8058151\/how-does-system-profiler-retrieve-the-full-mac-hardware-identifier\" rel=\"nofollow noopener\" target=\"_blank\">SPHardwaretype<\/a> data, which, among other things, reveals a Mac\u2019s serial number. The malware also started modifying the LaunchDaemon folder instead of the LaunchAgent folder as before. While the change requires UpdateAgent to run as administrator, the change allows the trojan to inject persistent code that runs as root.<\/p>\n<p class=\"paywall\"><strong>The following timeline illustrates the evolution.<\/strong><\/p>\n<p class=\"paywall\">Once installed, the malware collects the system info and sends it to the attackers\u2019 control server and takes a host of other actions. <strong>The attack chain of the latest exploit looks like this:<\/strong><\/p>\n<p class=\"paywall\">Microsoft said UpdateAgent masquerades as legitimate software, such as video apps or support agents, that is spread through pop-ups or ads on hacked or malicious websites. Microsoft didn\u2019t explicitly say so, but users apparently must be tricked into installing UpdateAgent, and during that process, Gatekeeper works as designed.<\/p>\n<p class=\"paywall\">In many ways, the evolution of UpdateAgent is a microcosm for the macOS malware landscape as a whole: Malware continues to become more advanced. Mac users should learn how to spot social engineering lures, such as unsolicited popups appearing in browser windows that warn of infections or unpatched software.<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/mac-malware-spreading-for-14-months-is-growing-increasingly-aggressive\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/mac-malware-spreading-for-14-months-is-growing-increasingly-aggressive\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/mac-malware-spreading-for-14-months-is-growing-increasingly-aggressive\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/mac-malware-growing-more-sophisticated\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61fdceeb808412610f9e4ca2\/master\/pass\/Security-Mac-Malware-1235461684.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Mon, 07 Feb 2022 14:00:00 +0000<\/strong><\/p>\n<p>When UpdateAgent emerged in late 2020, it utilized basic infiltration techniques. Its developers have since expanded it in dangerous ways.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18215","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18215"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18215\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}