<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Flash Player — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/flash-player/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/flash-player/feed.xml" rel="self" type="application/rss+xml"/><item><title>Comprehensive Analysis of Mac Malware in 2017</title><link>https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2017/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2017/</guid><description>A comprehensive analysis of Mac malware discovered in 2017, detailing infection vectors, persistence mechanisms, features, and goals, including FruitFly, MacDownloader (iKitten), and others.</description><content:encoded><![CDATA[<p>This threat brief summarizes Mac malware that emerged in 2017, based on a compilation by Objective-See. The analysis covers infection vectors, persistence mechanisms, features, and goals of various malware families, providing insights into the macOS threat landscape. Specific malware discussed includes FruitFly (discovered in January 2017), a backdoor designed to spy on users; MacDownloader (iKitten) (February 2017), an Iranian exfiltration agent; and others like Proton, XAgent, FileCoder, Dok, Snake, MacSpy, MacRansom, Pwnet, and CpuMeaner. The report aims to provide a comprehensive overview for defenders, facilitating detection and remediation efforts. The initial discovery of FruitFly received significant media attention due to its longevity and invasive capabilities. MacDownloader has been linked to Iranian offensive cyber operations targeting the defense industrial base and human rights advocates.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Infection (MacDownloader):</strong> A phishing email directs the user to a fake Adobe Flash Player download site.</li>
<li><strong>Execution:</strong> The user downloads and executes the fake Flash Player installer (addone flashplayer.app). Gatekeeper may block execution unless disabled or explicitly allowed.</li>
<li><strong>Persistence (FruitFly):</strong> The malware creates a launch agent (plist file) in the ~/Library/LaunchAgents/ directory (e.g., com.client.client.plist for FruitFly variant &lsquo;A&rsquo;).</li>
<li><strong>Persistence (MacDownloader):</strong> Attempts to modify /etc/rc.common to execute /etc/.checkdev on startup, but this functionality may be incomplete.</li>
<li><strong>Data Collection (MacDownloader):</strong> The malware harvests information on the infected system, including active Keychains, running processes, installed applications, and potentially usernames and passwords via fake System Preferences dialog.</li>
<li><strong>Command and Control (FruitFly):</strong> The malware connects to a command and control (C2) server.</li>
<li><strong>Data Exfiltration (MacDownloader):</strong> Stolen data, including keychain contents and system information, are exfiltrated to the C2 server.</li>
<li><strong>Remote Access (FruitFly):</strong> The attacker gains remote access to the file system, can execute system commands, and access the webcam. They can also generate screen captures and simulate mouse/keyboard events.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The malware detailed in this report can lead to significant compromise of macOS systems. FruitFly allows attackers to spy on users via their webcams, access files, and control the system remotely. MacDownloader (iKitten) targets sensitive data, including keychain credentials, potentially enabling attackers to access protected accounts and services. Successful infections can result in data theft, espionage, and loss of control over the compromised system. Although specific victim counts are not provided, the malware targeted a wide range of users and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of launch agents in the ~/Library/LaunchAgents/ directory, especially those with suspicious names and associated executables, to detect persistence mechanisms used by malware like FruitFly. Deploy a tool like KnockKnock to aid in detection (Attack Chain - Step 3).</li>
<li>Implement detections for attempts to modify the /etc/rc.common file, which MacDownloader attempts to use for persistence, although the functionality may be incomplete (Attack Chain - Step 4).</li>
<li>Deploy the Sigma rule to detect execution of unsigned applications, which is a common characteristic of malware like MacDownloader that relies on tricking users into bypassing Gatekeeper (Attack Chain - Step 2).</li>
<li>Enable network monitoring to identify connections to command and control servers used by malware such as FruitFly (Attack Chain - Step 6).</li>
<li>Monitor process execution for connections to external IP addresses (Attack Chain - Step 6).</li>
<li>Educate users about the risks of phishing emails and the importance of verifying the authenticity of software downloads to prevent initial infection from malware like MacDownloader (Attack Chain - Step 1).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>macos</category><category>malware</category><category>backdoor</category><category>exfiltration</category><category>persistence</category></item></channel></rss>