<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>OSX.Mami — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/osx.mami/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:34:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/osx.mami/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mac Malware of 2018 Retrospective</title><link>https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2018/</link><pubDate>Wed, 03 Jan 2024 17:34:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2018/</guid><description>This brief analyzes Mac malware discovered in 2018, including OSX.Mami, a DNS hijacker distributed via browser popups, and CrossRAT, a cross-platform Java-based backdoor likely spread through phishing, highlighting infection vectors, persistence mechanisms, and capabilities.</description><content:encoded><![CDATA[<p>This report retrospectively examines Mac malware identified throughout 2018, providing a comprehensive overview of emerging threats targeting macOS systems. The analysis covers various malware specimens, detailing their infection vectors, persistence mechanisms, and intended goals. Noteworthy examples include OSX.Mami, a DNS hijacker that redirects traffic to attacker-controlled servers, and CrossRAT, a cross-platform Java-based backdoor used in cyber-espionage campaigns. The report emphasizes the evolving threat landscape for macOS and the importance of understanding malware capabilities to defend against attacks. Specifics include the distribution of CreativeUpdate via trojanized applications on MacUpdate.com and the use of Launch Daemons and Launch Agents for persistence by OSX.Mami and CrossRAT respectively. The analyzed malware spans from January 2018 (Mami) to December 2018 (DarthMiner, LamePyre).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (OSX.Mami):</strong> A user visits a malicious website, triggering a browser popup.</li>
<li><strong>User Interaction (OSX.Mami):</strong> The user interacts with the popup, leading to the download of a Mach-O executable named &ldquo;MaMi&rdquo;.</li>
<li><strong>Execution (OSX.Mami):</strong> The user executes the downloaded &ldquo;MaMi&rdquo; file.</li>
<li><strong>Persistence (OSX.Mami):</strong> The malware installs itself as a Launch Daemon with the file path <code>/Library/LaunchDaemons/Cyclonica.plist</code>, referencing a malicious file in the user&rsquo;s home directory.</li>
<li><strong>Privilege Escalation (OSX.Mami):</strong> The malware installs a malicious certificate in the System Keychain.</li>
<li><strong>DNS Hijacking (OSX.Mami):</strong> The malware modifies the <code>/Library/Preferences/SystemConfiguration/preferences.plist</code> file, changing the system&rsquo;s DNS settings to attacker-controlled servers (82.163.143.135 and 82.163.142.137).</li>
<li><strong>Man-in-the-Middle Attack (OSX.Mami):</strong> The attacker performs man-in-the-middle attacks, potentially spying on user activity and injecting malicious content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mac malware of 2018 exhibited a range of malicious capabilities, including DNS hijacking, remote access, and data exfiltration. OSX.Mami&rsquo;s DNS hijacking enabled attackers to potentially monitor user activity and inject malicious content, compromising user privacy and security. CrossRAT, a cross-platform backdoor, allowed attackers to remotely control infected systems and exfiltrate sensitive information. While specific victim counts and sectors are not detailed, the malware posed a significant threat to macOS users and organizations. Success of these attacks could lead to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for DNS queries to the known malicious DNS servers <code>82.163.143.135</code> and <code>82.163.142.137</code> associated with OSX.Mami (IOC table).</li>
<li>Implement the Sigma rule to detect the creation of LaunchAgent plists containing references to java -jar execution, which is indicative of CrossRAT persistence.</li>
<li>Monitor process creation events for execution of binaries from the <code>/Library/LaunchDaemons/</code> directory, specifically looking for the <code>Cyclonica.plist</code> file (Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>macos</category><category>malware</category><category>dns-hijacking</category><category>backdoor</category></item></channel></rss>