Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

New Variant of Shlayer macOS Malware Discovered

Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3.

Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3.

The threat is being distributed through a large number of websites, fake or hijacked legitimate domains, and poses as an Adobe Flash update. Employing multiple levels of obfuscation, the malware can escalate privileges after infecting the target system. 

The malicious payload is mainly delivered in the form of DMG files, most of which are signed with a legitimate Apple developer ID and perform the installation using legitimate system applications via bash. While most of the observed samples were DMG files, Carbon Black also found PKG, ISO, and ZIP payloads. 

The security researchers noticed that, when the DMG is mounted and the installer executed, a .command script runs from a hidden directory, to decrypt a second script that contains and executes an additional script, representing the final step of the first stage of the infection. 

After identifying the script location and performing a verification check, the first stage collects system information, including macOS version and UUID, generates a “Session GUID” using uuidgen, creates a custom URL using the harvested data, and then downloads the second stage payload. 

The script attempts to download the password-protected payload (a ZIP file) using curl, and creates a directory in /tmp to store and unzip the archive. 

Next, it makes the binary within the unzipped .app executable using chmod +x, runs the payload using specific arguments, and then performs a killall Terminal to kill the running script’s terminal window.

After the second stage payload has been executed, it attempts to escalate privileges with sudo using a technique invoking /usr/libexec/security_authtrampoline

Advertisement. Scroll to continue reading.

Once it has gained root privileges, the malware attempts to download additional software, and disables Gatekeeper to ensure the downloaded software can run without user intervention. Many of the downloaded applications are signed with a valid developer ID too, Carbon Black reveals. 

Related: Windows App Caught Running on Mac, Installing Malware

Related: Mac Malware Injects Ads Into Encrypted Traffic

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.