OSX.Dummy Malware Targeting Cryptocurrency Community
OSX.Dummy is a new macOS malware targeting the cryptocurrency community, as reported by Objective-See.
Objective-See reported on a new piece of macOS malware dubbed OSX.Dummy targeting the cryptocurrency community. The report details how their tools can generically thwart this threat at various stages of execution. While specific technical details of the malware’s operation and delivery are not provided, the report highlights its existence and potential impact on cryptocurrency users. Defenders should be aware of this emerging threat and consider implementing generic detections to catch this and similar malware families. The original report was published in June 2018.
Attack Chain
- Initial Access: The report does not specify the initial access vector.
- Execution: The report does not specify how the malware executes.
- Persistence: The report does not specify the persistence mechanisms.
- Defense Evasion: The report does not specify defense evasion techniques.
- Credential Access: The report does not specify credential access techniques.
- Discovery: The report does not specify discovery techniques.
- Collection: The report does not specify data collection techniques.
- Impact: Cryptocurrency theft from infected macOS systems.
Impact
The primary impact of OSX.Dummy is likely the theft of cryptocurrency from infected macOS systems. The specific number of victims and the extent of the damage are not specified in the provided source. Successful infection could result in significant financial loss for affected individuals within the cryptocurrency community.
Recommendation
- Investigate common macOS malware persistence locations for unusual files or processes.
- Monitor network connections for unusual outbound traffic, which could indicate communication with a C2 server.
- Deploy behavioral detection rules focusing on suspicious process execution patterns on macOS.
Detection coverage 2
Detect Suspicious File Creation in Common macOS Persistence Directories
mediumDetects the creation of new files in common macOS persistence directories, which may indicate malware installation.
Detect Execution from Common macOS Download Directories
lowDetects execution of files from common download directories, which may indicate a user inadvertently launching downloaded malware.
Detection queries are available on the platform. Get full rules →