Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

New Variant of Shlayer macOS Malware Discovered

Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3.

Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3.

The threat is being distributed through a large number of websites, fake or hijacked legitimate domains, and poses as an Adobe Flash update. Employing multiple levels of obfuscation, the malware can escalate privileges after infecting the target system. 

The malicious payload is mainly delivered in the form of DMG files, most of which are signed with a legitimate Apple developer ID and perform the installation using legitimate system applications via bash. While most of the observed samples were DMG files, Carbon Black also found PKG, ISO, and ZIP payloads. 

The security researchers noticed that, when the DMG is mounted and the installer executed, a .command script runs from a hidden directory, to decrypt a second script that contains and executes an additional script, representing the final step of the first stage of the infection. 

After identifying the script location and performing a verification check, the first stage collects system information, including macOS version and UUID, generates a “Session GUID” using uuidgen, creates a custom URL using the harvested data, and then downloads the second stage payload. 

The script attempts to download the password-protected payload (a ZIP file) using curl, and creates a directory in /tmp to store and unzip the archive. 

Next, it makes the binary within the unzipped .app executable using chmod +x, runs the payload using specific arguments, and then performs a killall Terminal to kill the running script’s terminal window.

After the second stage payload has been executed, it attempts to escalate privileges with sudo using a technique invoking /usr/libexec/security_authtrampoline

Once it has gained root privileges, the malware attempts to download additional software, and disables Gatekeeper to ensure the downloaded software can run without user intervention. Many of the downloaded applications are signed with a valid developer ID too, Carbon Black reveals. 

Related: Windows App Caught Running on Mac, Installing Malware

Related: Mac Malware Injects Ads Into Encrypted Traffic

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cyberwarfare

Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.