<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Objective-See — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/objective-see/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 07:47:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/objective-see/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS SIP Bypass via Sandboxing Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-sip-bypass/</link><pubDate>Thu, 07 May 2026 07:47:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sip-bypass/</guid><description>A macOS vulnerability enables bypassing System Integrity Protection (SIP) by abusing sandboxing mechanisms to load an untrusted library into a SIP-entitled process.</description><content:encoded><![CDATA[<p>A macOS vulnerability allows attackers to bypass System Integrity Protection (SIP) by coercing a SIP-entitled process to load an untrusted library. The vulnerability abuses macOS sandboxing mechanisms, leading to a privilege escalation scenario. While the exact details of the vulnerability are not provided, the attack involves tricking the system into loading a malicious library into a protected process. This can allow attackers to execute arbitrary code with elevated privileges and bypass system-level protections. The original write-up of the vulnerability was posted on the researcher&rsquo;s personal site, and the vulnerability was reported in 2018.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious dynamic library.</li>
<li>The attacker identifies a SIP-entitled process on macOS.</li>
<li>The attacker leverages a sandboxing vulnerability or misconfiguration to influence the target process.</li>
<li>The system is tricked into loading the malicious library into the SIP-entitled process.</li>
<li>The malicious library executes within the context of the SIP-entitled process.</li>
<li>The attacker gains elevated privileges and bypasses SIP restrictions.</li>
<li>The attacker performs malicious actions, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit of this vulnerability allows an attacker to bypass System Integrity Protection, a critical security feature in macOS. This can lead to complete system compromise, as the attacker can execute arbitrary code with elevated privileges. Although specific victim counts and targeted sectors are unavailable, the vulnerability poses a significant threat to any macOS system where SIP is relied upon for security.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unexpected library loads into SIP-entitled processes using process creation and image load logs.</li>
<li>Investigate any unexplained modifications to sandboxing configurations or profiles.</li>
<li>Deploy the Sigma rule to detect the loading of unsigned libraries into protected processes.</li>
<li>Enable and review system integrity events to identify unauthorized modifications to system files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>macos</category><category>sip-bypass</category></item><item><title>Comprehensive Analysis of Mac Malware in 2017</title><link>https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2017/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2017/</guid><description>A comprehensive analysis of Mac malware discovered in 2017, detailing infection vectors, persistence mechanisms, features, and goals, including FruitFly, MacDownloader (iKitten), and others.</description><content:encoded><![CDATA[<p>This threat brief summarizes Mac malware that emerged in 2017, based on a compilation by Objective-See. The analysis covers infection vectors, persistence mechanisms, features, and goals of various malware families, providing insights into the macOS threat landscape. Specific malware discussed includes FruitFly (discovered in January 2017), a backdoor designed to spy on users; MacDownloader (iKitten) (February 2017), an Iranian exfiltration agent; and others like Proton, XAgent, FileCoder, Dok, Snake, MacSpy, MacRansom, Pwnet, and CpuMeaner. The report aims to provide a comprehensive overview for defenders, facilitating detection and remediation efforts. The initial discovery of FruitFly received significant media attention due to its longevity and invasive capabilities. MacDownloader has been linked to Iranian offensive cyber operations targeting the defense industrial base and human rights advocates.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Infection (MacDownloader):</strong> A phishing email directs the user to a fake Adobe Flash Player download site.</li>
<li><strong>Execution:</strong> The user downloads and executes the fake Flash Player installer (addone flashplayer.app). Gatekeeper may block execution unless disabled or explicitly allowed.</li>
<li><strong>Persistence (FruitFly):</strong> The malware creates a launch agent (plist file) in the ~/Library/LaunchAgents/ directory (e.g., com.client.client.plist for FruitFly variant &lsquo;A&rsquo;).</li>
<li><strong>Persistence (MacDownloader):</strong> Attempts to modify /etc/rc.common to execute /etc/.checkdev on startup, but this functionality may be incomplete.</li>
<li><strong>Data Collection (MacDownloader):</strong> The malware harvests information on the infected system, including active Keychains, running processes, installed applications, and potentially usernames and passwords via fake System Preferences dialog.</li>
<li><strong>Command and Control (FruitFly):</strong> The malware connects to a command and control (C2) server.</li>
<li><strong>Data Exfiltration (MacDownloader):</strong> Stolen data, including keychain contents and system information, are exfiltrated to the C2 server.</li>
<li><strong>Remote Access (FruitFly):</strong> The attacker gains remote access to the file system, can execute system commands, and access the webcam. They can also generate screen captures and simulate mouse/keyboard events.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The malware detailed in this report can lead to significant compromise of macOS systems. FruitFly allows attackers to spy on users via their webcams, access files, and control the system remotely. MacDownloader (iKitten) targets sensitive data, including keychain credentials, potentially enabling attackers to access protected accounts and services. Successful infections can result in data theft, espionage, and loss of control over the compromised system. Although specific victim counts are not provided, the malware targeted a wide range of users and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of launch agents in the ~/Library/LaunchAgents/ directory, especially those with suspicious names and associated executables, to detect persistence mechanisms used by malware like FruitFly. Deploy a tool like KnockKnock to aid in detection (Attack Chain - Step 3).</li>
<li>Implement detections for attempts to modify the /etc/rc.common file, which MacDownloader attempts to use for persistence, although the functionality may be incomplete (Attack Chain - Step 4).</li>
<li>Deploy the Sigma rule to detect execution of unsigned applications, which is a common characteristic of malware like MacDownloader that relies on tricking users into bypassing Gatekeeper (Attack Chain - Step 2).</li>
<li>Enable network monitoring to identify connections to command and control servers used by malware such as FruitFly (Attack Chain - Step 6).</li>
<li>Monitor process execution for connections to external IP addresses (Attack Chain - Step 6).</li>
<li>Educate users about the risks of phishing emails and the importance of verifying the authenticity of software downloads to prevent initial infection from malware like MacDownloader (Attack Chain - Step 1).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>macos</category><category>malware</category><category>backdoor</category><category>exfiltration</category><category>persistence</category></item><item><title>macOS Local Privilege Escalation via Dylib Hijacking in App Store Applications</title><link>https://feed.craftedsignal.io/briefs/2024-01-macos-dylib-hijacking/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-macos-dylib-hijacking/</guid><description>A local privilege escalation vulnerability in macOS allows attackers to gain root privileges by hijacking dylibs in applications installed from the Mac App Store.</description><content:encoded><![CDATA[<p>This brief addresses a local privilege escalation vulnerability in macOS that leverages dylib hijacking within applications obtained from the official Mac App Store. The vulnerability allows a malicious actor to inject a dynamic library (dylib) into a legitimate application, potentially gaining elevated privileges. The attack exploits weaknesses in how macOS applications load dynamic libraries, specifically the use of weak loading and run-path dependent (rpath) dylibs. While applications dragged into the /Applications directory are typically owned by the user, applications installed from the App Store are owned by root, requiring privilege escalation to exploit. This vulnerability matters because it allows attackers to bypass intended security restrictions and gain root access, even on systems with standard security configurations. Successful exploitation enables persistence and further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable application using tools like Dylib Hijack Scanner (DHS), looking for apps with weak or rpath-dependent dylib loading.</li>
<li>The attacker confirms the absence of library-validation option (flag=0x200) using <code>codesign</code> to verify if dylib hijacking is possible.</li>
<li>The attacker crafts a malicious dylib (e.g., <code>hello-tresorit.dylib</code>) containing code to be executed upon loading, such as opening a Terminal or creating a syslog entry.</li>
<li>The attacker uses <code>gcc</code> to compile the dylib. The attacker uses a tool like <code>createHijacker.py</code> to fix the dylib version and add exports from the original dylib to the malicious dylib.</li>
<li>The attacker exploits a vulnerability to bypass root folder permissions to copy the malicious dylib to the application&rsquo;s framework directory (e.g., <code>/Applications/Tresorit.app/Contents/MacOS/TresoritExtension.app/Contents/PlugIns/FinderExtension.appex/Contents/MacOS/../../../../Frameworks/UtilsMac.framework/Versions/A/UtilsMac</code>).</li>
<li>The attacker launches the targeted application, causing the malicious dylib to be loaded into the application process.</li>
<li>The malicious code within the dylib executes with the privileges of the application, potentially escalating privileges to root.</li>
<li>The attacker achieves persistence or performs other malicious actions based on the gained privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete system compromise. An attacker gaining root access can install persistent backdoors, steal sensitive data, or deploy ransomware. The number of potential victims is large, as many macOS applications from the App Store are vulnerable. The affected sectors span various industries, as the vulnerability affects a wide range of applications. The consequences of a successful attack range from data breaches and financial loss to complete system control by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Use a tool like Dylib Hijack Scanner to identify vulnerable applications in your environment and prioritize patching or removal.</li>
<li>Monitor for the creation of new dylibs within application framework directories, which may indicate a dylib hijacking attempt, using a file integrity monitoring system.</li>
<li>Deploy the Sigma rule <code>Detecting Dylib Hijacking via DYLD_PRINT_RPATHS</code> to detect attempts to identify vulnerable dylibs.</li>
<li>Enable library validation for applications to prevent the loading of unsigned or improperly signed dylibs.</li>
<li>Use process monitoring tools like Objective-See&rsquo;s ProcInfo to detect suspicious process creation events that may be indicative of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dylib-hijacking</category><category>privilege-escalation</category><category>macos</category></item><item><title>macOS Kernel-to-Userland Process Creation Notification via undocumented kev_msg_post</title><link>https://feed.craftedsignal.io/briefs/2024-01-kev-msg-post-process-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kev-msg-post-process-creation/</guid><description>The kev_msg_post function can be abused by malware to broadcast process creation notifications from a kernel extension (kext) to a user-mode application, potentially bypassing security tools that rely on standard APIs and leading to undetected malicious activity.</description><content:encoded><![CDATA[<p>This threat brief describes the abuse of the undocumented <code>kev_msg_post</code> function in macOS to broadcast process creation notifications from a kernel extension (kext) to a user-mode application. This technique, highlighted in Objective-See&rsquo;s research, allows a kext to bypass standard userland APIs for process monitoring. The <code>kev_msg_post</code> function is part of the Kernel Events API. It&rsquo;s designed for kernel-to-userland communication but lacks proper documentation, which makes it difficult to monitor.</p>
<p>The communication involves a kext utilizing <code>kev_msg_post</code> to send data to a user-mode application through a system socket.  Objective-See&rsquo;s BlockBlock tool uses this technique to correlate persistent file I/O events with the responsible process.  Abuse of <code>kev_msg_post</code> can allow malicious kexts to exfiltrate sensitive kernel-level information or trigger actions in user-mode without detection by conventional monitoring tools. This technique is relevant to defenders because it provides a stealthy mechanism for malware to operate within macOS, potentially leading to undetected data theft, privilege escalation, or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious kext is loaded into the macOS kernel, often requiring elevated privileges or exploiting a vulnerability.</li>
<li>The kext uses the <code>kev_vendor_code_find</code> function to obtain a vendor ID associated with the kext (e.g., &ldquo;com.objective-see&rdquo;).</li>
<li>The kext registers for process execution events using kauth or MAC policies.</li>
<li>When a new process is created, the kext&rsquo;s callback function is triggered.</li>
<li>The kext populates a <code>kev_msg</code> structure with process information, including the process ID (PID), user ID (UID), parent process ID (PPID), and path to the executable.</li>
<li>The kext calls the undocumented <code>kev_msg_post</code> function to broadcast the process information to a system socket.</li>
<li>A user-mode application with a socket connected to the same vendor ID receives the broadcasted message, extracting the process information.</li>
<li>The attacker can use the process information for malicious purposes, such as injecting code into the new process, monitoring its activity, or terminating it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow attackers to monitor and manipulate processes on a compromised macOS system without detection by standard userland monitoring tools.  This could lead to data exfiltration, privilege escalation, or other malicious activities. Due to the nature of the kernel, even a single successful compromise can lead to complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the loading of unsigned or untrusted kernel extensions using system integrity monitoring tools that track kext loading events.</li>
<li>Implement detections for user-mode applications creating system sockets with the <code>SYSPROTO_EVENT</code> protocol, as described in the &ldquo;Receiving the Data in User-Mode&rdquo; section. This can be done using an endpoint detection and response (EDR) solution or auditd.</li>
<li>Develop YARA rules to scan kernel memory for the presence of kexts using the undocumented <code>kev_msg_post</code> function to detect malicious kexts attempting to communicate outside kernel space.</li>
<li>Audit the use of <code>ioctl</code> calls with <code>SIOCGKEVVENDOR</code> and <code>SIOCSKEVFILT</code> to detect user-mode applications attempting to filter for specific kernel events, using the code samples from the &ldquo;Receiving the Data in User-Mode&rdquo; section as reference.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kernel-extension</category><category>kev_msg_post</category><category>macos</category><category>process-monitoring</category></item><item><title>macOS File Monitoring via Endpoint Security Framework</title><link>https://feed.craftedsignal.io/briefs/2024-01-macos-file-monitor/</link><pubDate>Tue, 02 Jan 2024 18:41:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-macos-file-monitor/</guid><description>Objective-See details how to create a file monitor for macOS 10.15 using Apple's Endpoint Security Framework to capture file I/O events and process information.</description><content:encoded><![CDATA[<p>This brief examines the creation of a file monitor on macOS 10.15 (Catalina) using Apple&rsquo;s Endpoint Security Framework, as detailed by Objective-See. This framework offers a user-mode interface to a new Endpoint Security Subsystem, providing a simplified API and comprehensive process information. The file monitor can capture file I/O events, file paths, and process details like process ID, path, and code-signing information. Objective-See highlights the limitations of older file monitoring methods like <code>/dev/fsevents</code> and OpenBSM, which lack detailed process information or face deprecation. This new framework aims to address these limitations, enabling more robust user-mode security tools. Tools like Ransomwhere? and BlockBlock use file monitoring for detecting ransomware and persistence events respectively, demonstrating its importance in macOS security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system (e.g., through exploitation or social engineering).</li>
<li>Attacker executes a malicious binary or script.</li>
<li>The malicious process creates or modifies a file on the system.</li>
<li>The Endpoint Security Framework captures the file I/O event.</li>
<li>The file monitor, leveraging the Endpoint Security Framework, receives a notification about the event.</li>
<li>The file monitor extracts information about the event, including the process ID, path, code-signing information, and the type of file event (e.g., create, write).</li>
<li>Based on the extracted information, the file monitor determines if the event is malicious (e.g., rapid creation of encrypted files, persistence attempt).</li>
<li>The file monitor alerts the user or security system about the malicious activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to various detrimental outcomes, including data encryption by ransomware, persistent malware installation, and unauthorized access to sensitive information. File monitors, such as the one described, aim to detect and prevent such attacks. Without proper file monitoring, malicious activities can go unnoticed, leading to significant data loss, system compromise, and financial damage. The Endpoint Security Framework intends to address the limitations of previous monitoring solutions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Endpoint Security Framework event collection to monitor file creation events using the <code>ES_EVENT_TYPE_NOTIFY_CREATE</code> event type described in the overview.</li>
<li>Deploy the Sigma rule for detecting file creation by unsigned processes to identify potentially malicious activity (see Sigma rule below).</li>
<li>Monitor for processes with missing or invalid code-signing information, as these may be indicators of malicious activity, using the Endpoint Security Framework&rsquo;s process information detailed in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>file-monitoring</category><category>endpoint-security</category><category>macos</category></item></channel></rss>