Skip to content
Threat Feed

Product

Macos

17 briefs RSS
high threat

WINDSHIFT APT Abuses Custom URL Schemes for macOS Infection

The WINDSHIFT APT group is infecting Macs by abusing custom URL schemes, where advertising support for a custom URL scheme in an application's Info.plist causes the application to be automatically launched when a URL with that scheme is opened, allowing attackers to remotely compromise systems with minimal user interaction and creating an initial access vector.

macOS WINDSHIFT APT url-scheme apt
2r 1t
critical advisory

macOS Privilege Escalation via Feedback Assistant Race Condition (CVE-2019-8565)

A race condition vulnerability (CVE-2019-8565) exists in macOS where a privileged XPC service, com.apple.appleseed.fbahelperd, improperly validates XPC messages based on process ID, allowing an unprivileged process to escalate privileges to root.

macOS +1 privilege-escalation xpc race-condition
2r 1t 1c
high threat

Firefox 0-day Drops OSX.Mokes.B Backdoor on macOS

A Firefox 0-day exploit was used to target Mac users, dropping a second backdoor identified as a new variant of the cross-platform Mokes malware (OSX.Mokes.B) with screen capture, audio capture, and document exfiltration capabilities.

exploited Firefox +2 malware backdoor osx.mokes macos
2r 5t 1i
medium advisory

macOS Mojave Sandbox Distributed Notification Bypass

A vulnerability in macOS Mojave allows sandboxed applications to bypass sandbox restrictions and surreptitiously monitor user activities by registering for distributed notifications by name, circumventing intended privacy protections.

macOS sandbox-escape privacy
2r 1t
critical advisory

macOS Local Privilege Escalation via CVE-2017-7170

CVE-2017-7170 is a local privilege escalation vulnerability in macOS stemming from insecure use of the `AuthorizationExecuteWithPrivileges` API, allowing unprivileged users to execute arbitrary code as root by sniffing authorization references.

macOS privilege-escalation cve-2017-7170
2r 1t 1c
critical threat

macOS Synthetic Mouse Event Vulnerabilities

macOS is vulnerable to synthetic mouse event attacks, allowing threat actors to bypass security mechanisms and interact with protected UI components to perform unauthorized actions like dumping keychains and loading kernel extensions.

exploited macOS synthetic events privilege escalation defense evasion
3r 2t 1c
high advisory

Coldroot RAT Targeting macOS

The Coldroot RAT is a cross-platform backdoor targeting macOS systems, providing remote attackers persistent access through a launch daemon, masquerading as an Apple audio driver, and beaconing to a command and control server.

macOS rat persistence coldroot
2r 2t 2i
high advisory

Comprehensive Analysis of Mac Malware in 2017

A comprehensive analysis of Mac malware discovered in 2017, detailing infection vectors, persistence mechanisms, features, and goals, including FruitFly, MacDownloader (iKitten), and others.

Flash Player +2 macos malware backdoor exfiltration persistence
3r 6t
high threat

Lazarus Group's AppleJeus macOS Backdoor via JMT Trader

The Lazarus APT group is distributing a macOS backdoor named AppleJeus via a fake cryptocurrency trading application called JMT Trader, persisting through a launch daemon and communicating with the C&C server beastgoc.com.

macOS Lazarus Group +4 applejeus backdoor cryptocurrency
2r 2t 3i
high threat

OSX.NetWire.A Backdoor Dropped via Firefox 0-day

A Firefox zero-day exploit was used to target Mac users, resulting in the installation of the OSX.NetWire.A malware, which establishes persistence and communicates with a command and control server.

exploited Firefox +1 osx malware backdoor
3r 2t 4i
high threat

WindShift APT Targeting Middle East with OSX.WindTail macOS Implant

The WindShift APT group is targeting Middle Eastern governments with a first-stage macOS implant called OSX.WindTail, abusing custom URL schemes for initial infection and establishing persistence via login items, while decrypting embedded strings to identify file extensions of interest.

OSX.WindTail +2 WindShift macos apt cyber-espionage
2r 1t
medium advisory

macOS QuickLook Thumbnail Cache Leak

macOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.

macOS quicklook cache thumbnail privacy
2r 1t
medium advisory

macOS File Monitoring via Endpoint Security Framework

Objective-See details how to create a file monitor for macOS 10.15 using Apple's Endpoint Security Framework to capture file I/O events and process information.

macOS +6 file-monitoring endpoint-security
2r 1t
medium advisory

Mac File Opener Adware Persists via Document Handler Registration

The 'Mac File Opener' adware achieves persistence by registering itself as a document handler for numerous file types, leveraging the Launch Services Daemon (lsd) to automatically parse the application's Info.plist and register the handlers.

macOS adware persistence
2r 1t
high threat

Lazarus Group's macOS 'Fileless' Implant

The Lazarus APT group is distributing a trojanized macOS application named UnionCryptoTrader.dmg that installs a launch daemon for persistence, downloads and executes secondary payloads in-memory, and communicates with the command and control server unioncrypto.vip.

macos Lazarus Group +4 lazarus fileless trojan
3r 3t 3i
medium advisory

Leveraging Apple's Endpoint Security Framework for Process Monitoring

This brief discusses the use of Apple's Endpoint Security Framework in macOS 10.15 and later for user-mode process monitoring, offering improved capabilities over the older OpenBSM subsystem.

macOS endpoint-security process-monitoring defense-evasion discovery
2r 2t
high threat

HackingTeam RCS Implant Installer Analysis

An implant installer for HackingTeam's RCS implant uses Apple's native OS X encryption scheme and a custom packer to deliver a persistent implant, indicating a potential resurgence of the group and an evolution in their techniques for macOS malware.

macOS HackingTeam rcs malware
2r 1t 3i