New Mac malware uses 'novel' tactic to bypass macOS Catalina security
Security researchers at antivirus firm Intego have discovered a new Mac malware in the wild that tricks users into bypassing modern macOS app security protections.
A new piece of Mac malware can bypass macOS Catalina security restrictions.
In macOS Catalina, Apple introduced new app notarization requirements. The features, baked in Gatekeeper, discourage users from opening unverified apps -- requiring malware authors to get more creative with their tactics.
As an example, Intego researchers have discovered a new Trojan horse malware actively spreading in the wild via poisoned Google search results that tricks users into bypassing those protections themselves.
The malware is delivered as a .dmg disk image masquerading as an Adobe Flash installer. But once it's mounted on a user's machine, it displays instructions guiding users through the malicious installation process.
The normal prompt that appears when an unverified button is clicked. Credit: Intego
In a tactic described by Intego as "novel," the malware asks users to right-click and open the malware instead of double-clicking it. Per macOS Catalina Gatekeeper settings, this displays a dialogue box that has an "Open" button. Normally, when clicking an unverified file, Apple doesn't allow users to open them so conveniently.
Right-clicking and opening a file allows users to run unverified software more easily. Credit: Intego
Normally, macOS discourages users from opening unverified apps by making the process more difficult. Specifically, forcing users to head into System Preferences to override Gatekeeper. The strategy also saves bad actors from signing up for an Apple Developer account or hijacking an existing one.
Once users actually open the installer app, it runs a bash shell script and extracts a password-protected .zip file that contains a more traditional malicious app bundle. Although it initially installs a legitimate version of Flash, Intego notes that it can also be used to download "any other Mac malware or adware package."
Interestingly, the malware has been spread via Google search results that redirect users to malicious webpages claiming that a browser's Flash Player is out of date. Intego added that the malware has, thus far, been able to avoid detection by most antivirus software.
The actual malicious portions of the malware are re-engineered variants of past macOS Trojans, such as Shlayer or Bundlore. Intego also spotted similar security-evading malware in 2019.
Since the malware is actively spreading via Google search results, the risk for compromise is a bit higher. Intego notes that it appears when users search for the exact titles of YouTube videos.
Users can avoid this malware by only clicking on links that they absolutely trust. If any website asks you to download something unsolicited, get out of there.
Indicators of compromise can include the following apps: flashInstaller.dmv in Downloads; a FlashInstaller.zip file or a file named "Installer" in a subfolder in private/var/folders.
Intego notes that several domains -- including youdontcare.com, display.monster, yougotupdated.com and installerapi.com -- have been associated with this campaign. Any traffic to or from these domains "should be considered a possible sign of an infection," the researchers said.
A new piece of Mac malware can bypass macOS Catalina security restrictions.
In macOS Catalina, Apple introduced new app notarization requirements. The features, baked in Gatekeeper, discourage users from opening unverified apps -- requiring malware authors to get more creative with their tactics.
As an example, Intego researchers have discovered a new Trojan horse malware actively spreading in the wild via poisoned Google search results that tricks users into bypassing those protections themselves.
The malware is delivered as a .dmg disk image masquerading as an Adobe Flash installer. But once it's mounted on a user's machine, it displays instructions guiding users through the malicious installation process.
The normal prompt that appears when an unverified button is clicked. Credit: Intego
In a tactic described by Intego as "novel," the malware asks users to right-click and open the malware instead of double-clicking it. Per macOS Catalina Gatekeeper settings, this displays a dialogue box that has an "Open" button. Normally, when clicking an unverified file, Apple doesn't allow users to open them so conveniently.
Right-clicking and opening a file allows users to run unverified software more easily. Credit: Intego
Normally, macOS discourages users from opening unverified apps by making the process more difficult. Specifically, forcing users to head into System Preferences to override Gatekeeper. The strategy also saves bad actors from signing up for an Apple Developer account or hijacking an existing one.
Once users actually open the installer app, it runs a bash shell script and extracts a password-protected .zip file that contains a more traditional malicious app bundle. Although it initially installs a legitimate version of Flash, Intego notes that it can also be used to download "any other Mac malware or adware package."
Interestingly, the malware has been spread via Google search results that redirect users to malicious webpages claiming that a browser's Flash Player is out of date. Intego added that the malware has, thus far, been able to avoid detection by most antivirus software.
The actual malicious portions of the malware are re-engineered variants of past macOS Trojans, such as Shlayer or Bundlore. Intego also spotted similar security-evading malware in 2019.
Who's at risk and how to avoid it
Even though Adobe Flash player will officially reach its end of life on Dec. 31, 2020, Intego notes that "outdated Flash" malware tends to be pretty successful. The aforementioned Shlayer Trojan, for example, infects about one in 10 Mac users.Since the malware is actively spreading via Google search results, the risk for compromise is a bit higher. Intego notes that it appears when users search for the exact titles of YouTube videos.
Users can avoid this malware by only clicking on links that they absolutely trust. If any website asks you to download something unsolicited, get out of there.
Indicators of compromise can include the following apps: flashInstaller.dmv in Downloads; a FlashInstaller.zip file or a file named "Installer" in a subfolder in private/var/folders.
Intego notes that several domains -- including youdontcare.com, display.monster, yougotupdated.com and installerapi.com -- have been associated with this campaign. Any traffic to or from these domains "should be considered a possible sign of an infection," the researchers said.
Comments
Just say no to Flash has been the watchword for years. Fortunately, Flash will be saying no to us all at the end of the year, as Adobe closes it down.
Meanwhile, if you use some kind of legacy service that requires Flash, stop!
Every so often I still get sites that have been hijacked informing me that "My flash player is out of date and needs to be updated". That right there gets and immediate window shut-down.
I agree with SJ - Flash is trash and one of the biggest security holes on any platform. The problem is I have a site I need for work that uses it so I’m forced to install it.