Story image

New backdoor malware targeting Mac devices

08 Jul 2016

New malware has been discovered that exposes Apple system to cyber-spying and full concealed control by malicious third parties.

Security firm Bitdefender have released details of the new malware, dubbed Backdoor.MAC.Eleanor.

The backdoor malware is embedded into a fake file converter application that is accessible online on reputable sites offering Mac applications and software. 

The EasyDoc Converter.app poses as a drag-and-drop file converter, but has no real functionality - it simply downloads a malicious script.

The script installs and registers the following components to system startup:

1.       Tor Hidden Service

This component creates a Tor hidden service that allows an attacker to anonymously access the control-and-command center from the outside – a local web server dubbed Web Service (PHP) - via a Tor-generated address.

2.       Web Service (PHP)

This component gives the attacker full control over the infected machine. The web service is set up locally and can be accessed through the “onion” address. After authenticating with the correct password, attackers gain access to a web-based control panel with the following abilities:

• File manager (view, edit, rename, delete, upload, download, and archive files)

• Command execution (execute commands)

• Script execution (execute scripts in PHP, PERL, Python, Ruby, Java, C)

• Shell via bind/reverse shell connect (remotely execute root commands)

• Simple packet crafter (probe firewall rule-sets and find entry points into a targeted system or network)

• Connect and administer databases

• Process list/Task manager (access the list of processes and applications running on the system)

• Send emails with attached files

The malware uses a tool named “wacaw” to capture images and videos from built-in webcams.

It also uses a daemon to grab updates and fetch files from the user’s computer or execute shell scripts.

3.       Pastebin Agent

Every infected machine has a unique Tor address that the attacker uses to connect and download the malware. All the addresses are stored on pastebin.com using this agent, after being encrypted with a public key using RSA and base64 algorithms.

Consequences

"This type of malware is particularly dangerous as it’s hard to detect and offers the attacker full control of the compromised system,” says Tiberius Axinte, technical leader, Bitdefender Antimalware Lab.

“For instance, someone can lock you out of your laptop, threaten to blackmail you to restore your private files or transform your laptop into a botnet to attack other devices. The possibilities are endless,” he explains.

This app is not digitally signed by Apple. As a safety precaution, Bitdefender recommends downloading applications exclusively from reputable websites, and using a security solution for Apple devices to fend off Mac-targeting malware and other specific threats.

Technical analysis was provided by Tiberius Axinte, Technical Leader at Bitdefender Antimalware Lab and Dragos Gavrilut, Antimalware Research Manager.

Better data management: Whose job is it?
An Experian executive’s practical advice on how to structure data-management roles within a modern business environment.
Platform9 and Intersect partner to bring unified cloud to A/NZ
“For Intersect, Platform9 represents the single most strategic solution to a set of challenges we see expanding across the board."
Meet the future of women in IT
Emily Sopers has just won Kordia’s first ever Women in Technology Scholarship, which was established to address gender imbalance in the information and communications technology (ICT) sector.
Web design programmers do an about face – again!
Google is aggressively pushing speed in the mobile environment as a critical ranking factor, and many eb design teams struggling to reach 80%+ speed scores on Google speed tests with gorgeous – but heavy - WordPress templates and themes.
Digital spending to hit US$1.2 trillion by 2022
A recent study by Zinnov shows that IoT spend reached US$201 billion in 2018 while outsourcing service providers generated $40 billion in revenue.
'Iwi Algorithm' can grow Aotearoa's mana
Ngāti Whātua Ōrākei innovation officer Te Aroha Grace says AI can help to combine the values from different cultures to help grow Aotearoa’s mana and brand – and AI is not just for commercial gain.
Dropbox brings in-country document hosting to A/NZ & Japan
Dropbox Business users in New Zealand, Australia, and Japan will be able to store their Dropbox files in-country, beginning in the second half of 2019.
Why 'right to repair' legislation could be a new lease on life for broken devices
“These companies are profiting at the expense of our environment and our pocketbooks as we become a throw-away society that discards over 6 million tonnes of electronics every year.”