<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Calendar 2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/calendar-2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:21:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/calendar-2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Calendar 2 Mac App Store Application Mines Cryptocurrency</title><link>https://feed.craftedsignal.io/briefs/2024-01-calendar-miner/</link><pubDate>Wed, 03 Jan 2024 18:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-calendar-miner/</guid><description>The 'Calendar 2' application, available on the official Mac App Store, was found to surreptitiously mine cryptocurrency on users' Macs, utilizing the 'xmr-stak' miner to mine Monero (XMR) and report mining operations to calendar.qbix.com.</description><content:encoded><![CDATA[<p>In March 2018, the &ldquo;Calendar 2&rdquo; application, distributed via the official Mac App Store, was discovered to contain hidden cryptocurrency mining capabilities. The application, developed by Qbix, utilized the &lsquo;xmr-stak&rsquo; miner to mine Monero (XMR) in the background, without clearly notifying users of this activity. The mining operation&rsquo;s statistics were reported to a remote server. While the application did contain some level of disclosure regarding its mining activities, users expressed dissatisfaction. The application has since been removed from the Mac App Store following reports to Apple. The discovery highlights the challenges of vetting applications in official app stores and the potential for abuse of system resources for financial gain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user downloads and installs the &ldquo;Calendar 2&rdquo; application from the official Mac App Store.</li>
<li>Upon launch, the application&rsquo;s <code>applicationDidFinishLaunching:</code> delegate method executes.</li>
<li>This triggers a call to <code>[MinerManager manager]</code> which initializes a <code>MinerManager</code> object.</li>
<li>During initialization, the <code>runMining</code> method is invoked.</li>
<li>The <code>runMining</code> method interacts with the <code>Coinstash_XMRSTAK.framework</code>, specifically calling the <code>+[Coinstash_XMRSTAK.Coinstash startMiningWithPort:password:coreCount:slowMemory:currency:]</code> method.</li>
<li>This method executes the <code>xmr-stak</code> miner binary located within the framework.</li>
<li>The <code>xmr-stak</code> miner connects to a mining pool (<code>pool.graft.hashvault.pro:7777</code>) and begins mining Monero (XMR) using CPU resources.</li>
<li>The application periodically sends mining statistics to <code>calendar.qbix.com/api/mining</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The &ldquo;Calendar 2&rdquo; application surreptitiously utilized users&rsquo; CPU resources to mine Monero, leading to performance degradation and increased power consumption. While the exact number of affected users is unknown, the application&rsquo;s presence on the Mac App Store suggests a potentially wide reach. Successful exploitation could lead to reduced system lifespan due to increased heat and stress on hardware components. The mining profits accrued by the developer, <a href="mailto:greg@qbix.com">greg@qbix.com</a>, at the expense of unsuspecting users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for the execution of <code>xmr-stak</code> from within application frameworks, using the provided Sigma rule, to detect potentially malicious cryptocurrency mining activity.</li>
<li>Enable process monitoring with command-line argument logging to identify processes connecting to known cryptocurrency mining pools (see <code>xmr-stak</code> command-line arguments in the attack chain).</li>
<li>Inspect network traffic for connections to <code>calendar.qbix.com/api/mining</code> to identify applications reporting mining statistics.</li>
<li>Deploy the file integrity monitoring rule to track changes in application frameworks that may indicate the addition of mining capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>cryptocurrency</category><category>miner</category><category>macos</category><category>appstore</category></item></channel></rss>