Product
WINDSHIFT APT Abuses Custom URL Schemes for macOS Infection
2 rules 1 TTPThe WINDSHIFT APT group is infecting Macs by abusing custom URL schemes, where advertising support for a custom URL scheme in an application's Info.plist causes the application to be automatically launched when a URL with that scheme is opened, allowing attackers to remotely compromise systems with minimal user interaction and creating an initial access vector.
macOS Privilege Escalation via Feedback Assistant Race Condition (CVE-2019-8565)
2 rules 1 TTP 1 CVEA race condition vulnerability (CVE-2019-8565) exists in macOS where a privileged XPC service, com.apple.appleseed.fbahelperd, improperly validates XPC messages based on process ID, allowing an unprivileged process to escalate privileges to root.
Firefox 0-day Drops OSX.Mokes.B Backdoor on macOS
2 rules 5 TTPs 1 IOCA Firefox 0-day exploit was used to target Mac users, dropping a second backdoor identified as a new variant of the cross-platform Mokes malware (OSX.Mokes.B) with screen capture, audio capture, and document exfiltration capabilities.
macOS Mojave Sandbox Distributed Notification Bypass
2 rules 1 TTPA vulnerability in macOS Mojave allows sandboxed applications to bypass sandbox restrictions and surreptitiously monitor user activities by registering for distributed notifications by name, circumventing intended privacy protections.
macOS Local Privilege Escalation via CVE-2017-7170
2 rules 1 TTP 1 CVECVE-2017-7170 is a local privilege escalation vulnerability in macOS stemming from insecure use of the `AuthorizationExecuteWithPrivileges` API, allowing unprivileged users to execute arbitrary code as root by sniffing authorization references.
macOS Synthetic Mouse Event Vulnerabilities
3 rules 2 TTPs 1 CVEmacOS is vulnerable to synthetic mouse event attacks, allowing threat actors to bypass security mechanisms and interact with protected UI components to perform unauthorized actions like dumping keychains and loading kernel extensions.
Coldroot RAT Targeting macOS
2 rules 2 TTPs 2 IOCsThe Coldroot RAT is a cross-platform backdoor targeting macOS systems, providing remote attackers persistent access through a launch daemon, masquerading as an Apple audio driver, and beaconing to a command and control server.
Comprehensive Analysis of Mac Malware in 2017
3 rules 6 TTPsA comprehensive analysis of Mac malware discovered in 2017, detailing infection vectors, persistence mechanisms, features, and goals, including FruitFly, MacDownloader (iKitten), and others.
Lazarus Group's AppleJeus macOS Backdoor via JMT Trader
2 rules 2 TTPs 3 IOCsThe Lazarus APT group is distributing a macOS backdoor named AppleJeus via a fake cryptocurrency trading application called JMT Trader, persisting through a launch daemon and communicating with the C&C server beastgoc.com.
OSX.NetWire.A Backdoor Dropped via Firefox 0-day
3 rules 2 TTPs 4 IOCsA Firefox zero-day exploit was used to target Mac users, resulting in the installation of the OSX.NetWire.A malware, which establishes persistence and communicates with a command and control server.
WindShift APT Targeting Middle East with OSX.WindTail macOS Implant
2 rules 1 TTPThe WindShift APT group is targeting Middle Eastern governments with a first-stage macOS implant called OSX.WindTail, abusing custom URL schemes for initial infection and establishing persistence via login items, while decrypting embedded strings to identify file extensions of interest.
macOS QuickLook Thumbnail Cache Leak
2 rules 1 TTPmacOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.
macOS File Monitoring via Endpoint Security Framework
2 rules 1 TTPObjective-See details how to create a file monitor for macOS 10.15 using Apple's Endpoint Security Framework to capture file I/O events and process information.
Mac File Opener Adware Persists via Document Handler Registration
2 rules 1 TTPThe 'Mac File Opener' adware achieves persistence by registering itself as a document handler for numerous file types, leveraging the Launch Services Daemon (lsd) to automatically parse the application's Info.plist and register the handlers.
Lazarus Group's macOS 'Fileless' Implant
3 rules 3 TTPs 3 IOCsThe Lazarus APT group is distributing a trojanized macOS application named UnionCryptoTrader.dmg that installs a launch daemon for persistence, downloads and executes secondary payloads in-memory, and communicates with the command and control server unioncrypto.vip.
Leveraging Apple's Endpoint Security Framework for Process Monitoring
2 rules 2 TTPsThis brief discusses the use of Apple's Endpoint Security Framework in macOS 10.15 and later for user-mode process monitoring, offering improved capabilities over the older OpenBSM subsystem.
HackingTeam RCS Implant Installer Analysis
2 rules 1 TTP 3 IOCsAn implant installer for HackingTeam's RCS implant uses Apple's native OS X encryption scheme and a custom packer to deliver a persistent implant, indicating a potential resurgence of the group and an evolution in their techniques for macOS malware.