Highly evasive cryptocurrency miner targets macOS

Researchers
warn
of
an
evasive
cryptojacking
malware
targeting
macOS
which
spreads
through
pirated
applications

Jamf
Threat
Labs
researchers
reported
that
an
evasive
cryptojacking
malware
targeting
macOS
was
spotted
spreading
under
the
guise
of
the
Appl

Highly evasive cryptocurrency miner targets macOS

Researchers
warn
of
an
evasive
cryptojacking
malware
targeting
macOS
which
spreads
through
pirated
applications

Jamf
Threat
Labs
researchers
reported
that
an
evasive
cryptojacking
malware
targeting
macOS
was
spotted
spreading
under
the
guise
of
the
Apple-developed
video
editing
software,
Final
Cut
Pro. 

Trojanized
versions
of
legitimate
applications
are
being
used
to
deploy
XMRig
cryptocurrency
miner
on
macOS
systems.


“Further
investigation
revealed
that
this
malicious
version
of
Final
Cut
Pro
contained
a
modification
unauthorized
by
Apple
that
was
executing
XMRig
in
the
background.”
reads
the


analysis

published
by
the
experts.

At
the
time
of
its
discovery,
the
sample
analyzed
by
the
experts
was
not
labeled
as
malicious
by
any
security
vendors
on
VirusTotal.
Today,
many
malicious
applications
continue
to
go
undetected
by
most
AV
vendors.

This
malware
relies
on
the
i2p
(Invisible
Internet
Project)
anonymization
network
for
communication.
The
malicious
code
uses
i2p
to
download
malicious
components
and
send
mined
currency
to
the
attacker’s
wallet.

The
researchers
noticed
similarities
with
other
examples
reported
by Trend
Micro
 in
February
2022.
However,
the
Jamf
Threat
Labs
pointed
out
that
there
were
still
discrepancies
and
unanswered
questions,
such
as
why
the
sample
they
found
was
so
evasive.


“We
downloaded
the
most
recent
torrent
with
the
highest
number
of
seeders
and
checked
the
hash
of
the
application
executable.
It
matched
the
hash
of
the
infected
Final
Cut
Pro
we
had
discovered
in
the
wild.
We
now
had
our
answer.”
continues
the
analysis.
“We
observed
that
the
torrent
was
uploaded
by
a
user
with
a
yearslong
track
record
of
uploading
pirated
macOS
software
torrents,
many
of
which
were
among
the
most
widely
shared
versions
for
their
respective
titles”

The
Jamf’s
report
revealed
that
the
tainted
app
was
distributed
through
Pirate
Bay
since
at
least
2019.

Jamf
was
able
to
identify
the
various
samples
of
the
malware
distributed
through
pirated
applications,
determining
when
they
appeared
in
the
torrent
community,
when
they
started
being
submitted
to
VirusTotal,
and
when
security
vendors
started
to
detect
the
malware.
This
allowed
the
cyber
security
firm
to
understand
the
malware
evolution
and
the
tactics
and
techniques
used
by
the
authors
to
avoid
detection.
The
experts
identified
three
generation
of
malware
since
August
2019.

The
first-generation
samples
were
using
the
AuthorizationExecuteWithPrivileges API
to
gain
elevated
privileges
and
install
the
Launch
Daemon
to
gain
persistence.
Later
first
generation
samples
changed
to
a
user
Launch
Agent,
which
would
not
require
the
conspicuous
password
prompt.
The
second-generation
samples
started
relying
on
the
user
launching
the
application
bundle
to
start
the
mining
process,
instead
of
gaining
persistence.

The
most
recent
variants
of
the
miner
hide
the
malicious
i2p
components
within
the
application
executable
using
base64
encoding.

The
report
states
that
despite
the
security
improvement
introduced
with
the
latest
macOS
version
Ventura,
it
was
still
possible
to
execute
cryptocurrency
miners
on
the
infected
system.


“On
the
other
hand,
macOS
Ventura
did
not
prevent
the
miner
from
executing.
By
the
time
the
user
receives
the
error
message,
that
malware
has
already
been
installed.”
concludes
the
report.
“It
did
prevent
the
modified
version
of
Final
Cut
Pro
from
launching,
which
could
raise
suspicion
for
the
user
as
well
as
greatly
reduce
the
probability
of
subsequent
launches
by
the
user.”

Follow
me
on
Twitter:


@securityaffairs

and


Facebook

and


Mastodon



Pierluigi Paganini


(
SecurityAffairs –

hacking,
malware)




About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.