Calendar 2 Mac App Store Application Mines Cryptocurrency
The 'Calendar 2' application, available on the official Mac App Store, was found to surreptitiously mine cryptocurrency on users' Macs, utilizing the 'xmr-stak' miner to mine Monero (XMR) and report mining operations to calendar.qbix.com.
In March 2018, the “Calendar 2” application, distributed via the official Mac App Store, was discovered to contain hidden cryptocurrency mining capabilities. The application, developed by Qbix, utilized the ‘xmr-stak’ miner to mine Monero (XMR) in the background, without clearly notifying users of this activity. The mining operation’s statistics were reported to a remote server. While the application did contain some level of disclosure regarding its mining activities, users expressed dissatisfaction. The application has since been removed from the Mac App Store following reports to Apple. The discovery highlights the challenges of vetting applications in official app stores and the potential for abuse of system resources for financial gain.
Attack Chain
- A user downloads and installs the “Calendar 2” application from the official Mac App Store.
- Upon launch, the application’s
applicationDidFinishLaunching:delegate method executes. - This triggers a call to
[MinerManager manager]which initializes aMinerManagerobject. - During initialization, the
runMiningmethod is invoked. - The
runMiningmethod interacts with theCoinstash_XMRSTAK.framework, specifically calling the+[Coinstash_XMRSTAK.Coinstash startMiningWithPort:password:coreCount:slowMemory:currency:]method. - This method executes the
xmr-stakminer binary located within the framework. - The
xmr-stakminer connects to a mining pool (pool.graft.hashvault.pro:7777) and begins mining Monero (XMR) using CPU resources. - The application periodically sends mining statistics to
calendar.qbix.com/api/mining.
Impact
The “Calendar 2” application surreptitiously utilized users’ CPU resources to mine Monero, leading to performance degradation and increased power consumption. While the exact number of affected users is unknown, the application’s presence on the Mac App Store suggests a potentially wide reach. Successful exploitation could lead to reduced system lifespan due to increased heat and stress on hardware components. The mining profits accrued by the developer, greg@qbix.com, at the expense of unsuspecting users.
Recommendation
- Monitor process creations for the execution of
xmr-stakfrom within application frameworks, using the provided Sigma rule, to detect potentially malicious cryptocurrency mining activity. - Enable process monitoring with command-line argument logging to identify processes connecting to known cryptocurrency mining pools (see
xmr-stakcommand-line arguments in the attack chain). - Inspect network traffic for connections to
calendar.qbix.com/api/miningto identify applications reporting mining statistics. - Deploy the file integrity monitoring rule to track changes in application frameworks that may indicate the addition of mining capabilities.
Detection coverage 3
Detect xmr-stak Miner Execution
highDetects the execution of the xmr-stak miner, often used for mining Monero.
Detect Mining Statistics Upload to Calendar.qbix.com
lowDetects network connections posting mining statistics to the Calendar.qbix.com domain.
File Integrity Monitoring of Application Frameworks
mediumDetects modification to an application's framework directory, potentially indicating malicious activity
Detection queries are available on the platform. Get full rules →