Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

New Variant of Shlayer macOS Malware Discovered

Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3.

Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3.

The threat is being distributed through a large number of websites, fake or hijacked legitimate domains, and poses as an Adobe Flash update. Employing multiple levels of obfuscation, the malware can escalate privileges after infecting the target system. 

The malicious payload is mainly delivered in the form of DMG files, most of which are signed with a legitimate Apple developer ID and perform the installation using legitimate system applications via bash. While most of the observed samples were DMG files, Carbon Black also found PKG, ISO, and ZIP payloads. 

The security researchers noticed that, when the DMG is mounted and the installer executed, a .command script runs from a hidden directory, to decrypt a second script that contains and executes an additional script, representing the final step of the first stage of the infection. 

After identifying the script location and performing a verification check, the first stage collects system information, including macOS version and UUID, generates a “Session GUID” using uuidgen, creates a custom URL using the harvested data, and then downloads the second stage payload. 

The script attempts to download the password-protected payload (a ZIP file) using curl, and creates a directory in /tmp to store and unzip the archive. 

Next, it makes the binary within the unzipped .app executable using chmod +x, runs the payload using specific arguments, and then performs a killall Terminal to kill the running script’s terminal window.

After the second stage payload has been executed, it attempts to escalate privileges with sudo using a technique invoking /usr/libexec/security_authtrampoline

Once it has gained root privileges, the malware attempts to download additional software, and disables Gatekeeper to ensure the downloaded software can run without user intervention. Many of the downloaded applications are signed with a valid developer ID too, Carbon Black reveals. 

Related: Windows App Caught Running on Mac, Installing Malware

Related: Mac Malware Injects Ads Into Encrypted Traffic

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.