Adware Doctor Steals and Exfiltrates Browser History from Mac App Store Users
Adware Doctor, a popular app available on the Mac App Store, surreptitiously steals user's browsing history from Safari and Chrome, compresses the data into a password-protected zip archive, and exfiltrates it to a remote server.
Adware Doctor, a top-grossing application found on the official Mac App Store, has been observed surreptitiously exfiltrating highly sensitive user information, specifically browser history, to a remote server. Discovered in August 2018 by @privacyis1st and further analyzed by Objective-See, the application claims to remove adware but in reality, it gathers browsing history from Safari and Chrome, zips the data, passwords it with “webtool,” and uploads it to adscan.yelabapp.com. This behavior bypasses user expectations of privacy within the Apple ecosystem, especially given Apple’s claims of rigorous app review. The application was sold for $4.99, potentially impacting a large number of users. Adware Doctor also has a history of using deceptive tactics and was previously known as “Adware Medic,” which was pulled from the store and quickly reappeared under a different name.
Attack Chain
- User downloads and installs “Adware Doctor” from the official Mac App Store.
- The user clicks the “Clean” button within the application’s UI, initiating the data collection process.
- Adware Doctor accesses and reads browser history databases, including
~/Library/Safari/History.dband~/Library/Application Support/Google/Chrome/Default/History. - The application creates a directory
~/Library/Containers/com.yelab.Browser-Sweeper/Data/Library/Application Support/com.yelab.Browser-Sweeper/historyto store gathered history data. - Adware Doctor uses the built-in
ziputility to compress the collected browser history intohistory.zip, protected with the password “webtool.” - The application attempts to upload the
history.zipfile to the domainadscan.yelabapp.comvia a POST request to the/1/checkadwareendpoint. - The exfiltrated data includes browsing history from Safari, Chrome, and potentially other browsers installed on the system.
Impact
The successful exfiltration of browser history allows the attacker to gain insight into a user’s browsing habits, visited websites, search queries, and potentially login credentials stored within browser data. Given Adware Doctor’s popularity as a top-grossing app in the Mac App Store at the time, a significant number of users were likely affected. This data could be used for targeted advertising, identity theft, or other malicious purposes. The incident undermines user trust in the Mac App Store’s security measures and Apple’s review process.
Recommendation
- Monitor process creations for the execution of
/bin/bashwith command-line arguments indicative of zip archive creation with a hardcoded password as shown in the Sigma rule “Detect Adware Doctor History Zip”. - Monitor network connections to
adscan.yelabapp.comto identify potential exfiltration attempts, as detailed in the IOC list. - Implement the Sigma rule “Detect Adware Doctor History Access” to detect suspicious file access patterns to browser history databases by processes outside the expected browser applications.
Detection coverage 2
Detect Adware Doctor History Zip
highDetects the use of zip to archive browser history with a hardcoded password, a technique used by Adware Doctor.
Detect Adware Doctor History Access
mediumDetects processes accessing browser history files outside of known browser applications.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
2
domain
7
hash_md5
| Type | Value |
|---|---|
| domain | adwareres.securemacos.com |
| domain | adscan.yelabapp.com |
| hash_md5 | 48a96e1c00be257debc9c9c58fafaffe |
| hash_md5 | f1a19b8929ec88a81a6bdce6d5ee66e6 |
| hash_md5 | 3e653285b290c12d40982e6bb65928c1 |
| hash_md5 | 801e59290d99ecb39fd218227674646e |
| hash_md5 | 8d0cd4565256a781f73aa1e68e2a63de |
| hash_md5 | e233edd82b3dffd41fc9623519ea281b |
| hash_md5 | 1db830f93667d9c38dc943595dcc2d85 |