Settings

Theme

Sophisticated OS X Backdoor Discovered

securelist.com

385 points by cyphersanctus 9 years ago · 154 comments

Reader

bink 9 years ago

What is it that makes this malware sophisticated? I didn't see anything about rootkits or process hiding / obfuscation. Is it not just a simple daemon that can be configured to monitor audio/video/keyboard and send the results back via an encrypted connection?

  • mauz0r 9 years ago

    My guess would be that they figured out how to compile QT statically (hence 14MB file size)... Other then that it seems to be a common RAT

vemv 9 years ago

Is 'backdoor' the correct term if the vulnerability does not originate from Apple?

  • linkregister 9 years ago

    I agree, the terminology Kaspersky Labs is using is incorrect and misleading. The further poster is right that this should be labeled as "rootkit."

    • throwaway76543 9 years ago

      No, Kaspersky Labs is using correct terminology.

      Some rootkits install a backdoor. Not all rootkits install a backdoor -- some merely conceal themselves and operate locally. The famous Sony Rootkit is one such example of a rootkit which did not add a backdoor.

      The defining characteristic of a rootkit is that it conceals its presence from the rest of the system. Backdoor.OSX.Mokes.a doesn't really do this -- it's only a backdoor. Not a rootkit.

      • superuser2 9 years ago

        Backdoor is a politically loaded term at this point. Backdoors (in privacy-related discourse) are vulnerabilities inserted intentionally by the manufacturer or government with supply-chain cooperation. The claim "Backdoor found in X's product" is roughly equivalent to the claim "Evidence found that X is a collaborator with the surveillance state" to many people, so we might want to be careful about throwing it around when we don't mean that.

        • oso2k 9 years ago

          At least for me, there is a distinction between a Phone Home capability and a Backdoor.

        • saurik 9 years ago

          That is different wording. One can find an OS X backdoor in Microsoft Word, for example. Here the OS X backdoor was found not in OS X but in some other program.

      • kbenson 9 years ago

        Whether the terminology is technically correct or not, I think it's obvious that it can easily be interpreted in different ways, some of which are incorrect. As such, while it may not be wrong, it is poorly chosen, and may be misleading. A better way to phrase it might have been "A sophisticated backdoor targeting OS X discovered".

        • markcerqueira 9 years ago

          > "A sophisticated backdoor targeting OS X discovered"

          Unsure how this clears up the rootkit versus backdoor confusion...

          • greenshackle 9 years ago

            It doesn't, it clears up the 'this was put in by Apple' confusion.

            • kbenson 9 years ago

              Yes, that's exactly what I was trying to address. I should have quoted the first sentence of the parent to make that obvious, since there were a few assertions in that comment.

      • seandougall 9 years ago

        Calling it a backdoor may be correct, but calling it an "OS X backdoor", particularly with no other context in the title, is not. It's merely clickbait.

        • smsm42 9 years ago

          Yes, I concluded from the title it's backdoor in OS X itself (which would be huge news), not merely a backdoor kit running on OS X (which is not really all that notable, absolutely no surprise that backdoor kits exist for OS X and this one is nothing special among them as it seems).

      • random55643 9 years ago

        Let's call it "a window with a shitty lock" instead of a "back door", if it's an unintentional vulnerability. Then we can just use "back door [left open]" to mean something intentional. Or, you know "key under a rock in the garden" because only certain people know where it is. Actually, I think that's where "Window( with a )S(hitty lock)" 95 first got it's name.

      • takeda 9 years ago

        rootkit comes from unix, it was a tool helping to restore admin privileges even after the admin found that the host was hacked (that's where the name comes from root = admin on unix). Its goal was to be invisible.

        The sony rootkit was named somewhat incorrectly, because it also tried to hide itself and no other existing malware names fit it.

        • stcredzero 9 years ago

          rootkit comes from unix, it was a tool helping to restore admin privileges even after the admin found that the host was hacked (that's where the name comes from root = admin on unix). Its goal was to be invisible.

          Are you sure? It also commonly referred to such kits being used by hostile parties. I've personally interrupted an attempt at installing the "Hungarian Rootkit" in the 90's. (I put unpatched Red Hat 6 online when Red Hat 7 was out.)

          (that's where the name comes from root = admin on unix)

          The fact that you think this is something that bears explaining is interesting in the context of HN. I hope this is based on something you've noticed about recent user trends here. There was a time when someone would be very surprised if a user here didn't already know this.

          • takeda 9 years ago

            I see my response was ambiguous. Of course I meant rootkit was always malicious. It was used by intruder to gain root back after admin though he restored the host after being hacked.

            Rootkits are the reason why it is recommended to wipe the whole system after being hacked, because you can't be sure there there wasn't anything installed.

          • Whitestrake 9 years ago

            > It also commonly referred to such kits being used by hostile parties.

            I suspect that's exactly what he means - a rootkit is deployed by an intruder so that when the admin discovers the host has been compromised and patches the vulnerability, the rootkit, if not addressed, will grant the intruder root capabilities once more.

          • caf 9 years ago

            Right. a "rootkit" was a kit of tools you deploy once you have obtained root (on someone else's server).

            • cmdrfred 9 years ago

              I always thought of them as a way to gain root. As in privilege escalation.

              • detaro 9 years ago

                A rootkit might come with tools for that, but the actual rootkit generally requires you having root (or some other privileged role) to deploy it. E.g. a Linux rootkit commonly is a kernel module, which you can only load if you have already obtained root privileges.

    • drdrey 9 years ago

      Looks to me like your run-of-the-mill malware. A rootkit is typically something that uses OS hooks to hide itself from the list of running processes for instance.

    • cbsmith 9 years ago

      There's a fine line between an "OS X Backdoor" and a "Backdoor in OS X"

  • mhurron 9 years ago

    Backdoors can be installed after the fact. The vendor putting in a back door is only one way for it to be present.

    This would be malware inserting a back door for further exploitation.

    • Analemma_ 9 years ago

      If you previously establish that the vulnerability was introduced by a third party, then "backdoor" might be an OK term afterward - after the context has been introuced.

      In an example without context (like, a headline), "backdoor" strongly implies that it was built by the vendor. I have to disagree with you and concur with the other commenters saying this was a very misleading choice of words by Kaspersky. They should have just said "malware".

      • eriknstr 9 years ago

        I agree. My first reaction when I read the headline was, I thought Apple had put it there, which I found disturbing seeing as how Apple has publicly spoken out against backdoors. I think a better title would be something like "Sophisticated OS X Backdooring Malware Discovered". That would make it clear that the backdoor is not present in the binaries shipped by Apple.

        • mseri 9 years ago

          Same here. Malicious backdoor or rootkit backdoor would have been more appropriate

      • wlesieutre 9 years ago

        I make the same association. A door is part of a building, and is put there during construction (initial release) or in owner-planned renovations (software updates).

        I've never heard of someone breaking into a building by cutting a hole into a wall to install their own entry door that they have a key to, but that's the scenario this "OS X backdoor" is describing.

    • DrJokepu 9 years ago

      I don't know much about security, but I had the impression that a "third-party" developed and installed backdoor is called a rootkit.

      • detaro 9 years ago

        Rootkit is more commonly used for something that actively messes with the system to avoid detection for itself and potentially other malware, often by intercepting system calls and removing evidence from the responses.

        Malware that just runs some code to provide a backdoor isn't necessarily a rootkit. E.g. if I install a VNC server on your system and turn off the tray icon, it is a backdoor. I could use a rootkit in combination to also hide it's files on disk, remove it from process listings, hide it's open sockets, ...

      • jdmichal 9 years ago

        A rootkit is a different beast. A backdoor is simply a (covert) way to gain remote access to a system. A rootkit involves being able to elevate user permissions such that you have full control over the computer. Rootkits also typically use such permissions to hide themselves from normal user accounts.

        I guess in a way you could see them as related, in that they both are access tools. A backdoor gets you remote access to the system in the first place. A rootkit gets you elevated access after you are in the system.

        • commenter23 9 years ago

          No, that's wrong.

          A rootkit is the thing you install once you have root - not a way to get root initially. It usually gives the attacker a means to access the machine in the future, even if the vulnerability she used is fixed in the future.

          Rootkits are designed to hide themselves. They are essentially attacker installed backdooors.

          A backdoor is basically a rootkit that is part of the original software as written by the original developer. The words have different connotations (rootkit is extremely negative, backdoors slightly less).

          • mordocai 9 years ago

            No, that's wrong. Wikipedia has definitions that match my own knowledge, so i'll link and quote those.

            https://en.wikipedia.org/wiki/Rootkit

            "A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) while at the same time masking its existence or the existence of other software."

            https://en.wikipedia.org/wiki/Backdoor_(computing)

            "A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems.

            A backdoor may take the form of a hidden part of a program,[1] a separate program (e.g. Back Orifice may subvert the system through a rootkit), or may be a hardware feature.[2] Although normally surreptitiously installed, in some cases backdoors are deliberate and widely known. These kinds of backdoors might have "legitimate" uses such as providing the manufacturer with a way to restore user passwords."

            • woodman 9 years ago

              No, that is really wrong. Rootkits aren't for privilege escalation, see the paragraph immediately following your quote:

              "... an attacker can install it once they've obtained root or Administrator access."

              Calling BO a backdoor is a major corruption of the word, as you loose the only word for describing intentionally weakened security - so that you may describe a thing which already has several more explicitly defining names: malware, trojan, dropper, etc.

              • jdmichal 9 years ago

                The installation of the rootkit is different from its purpose. A rootkit may require a root permission to install, perhaps piggybacking on another legitimate install such as in the famous Sony BMG rootkit. Or it may use an exploit to gain root access and install.

                However, once installed, the purpose is the same: To provide the attacker with root permissions. It will also typically use its access to root permissions to hide itself from detection.

                • woodman 9 years ago

                  > A rootkit may require a root permission to install...

                  This sort of phrasing is misleading. If your OS restricts security sensitive kernel functions to the root user (hint: 99% of OSes do), then it isn't "may" - it is "must". Are there wrapper scripts that run privilege escalation exploits before installing the rootkit? Yes. Doesn't that make the exploit part of the rootkit? No, they are two very different things performing two different functions and are capable of operating independent of one-another.

                  > ...the purpose is the same: To provide the attacker with root permissions.

                  No, it is to allow code to run at the same privilege level as the kernel itself. Unrestricted loadable kernel modules. Think that is a distinction without a difference? OSX disagrees, as does Windows.

                  • jdmichal 9 years ago

                    Regardless, the point of a rootkit is to provide an execution context with escalated privileges. Whether that means root user, kernel space, System user is I would think depends on the specific rootkit. (Whose name, of course, points to "root" privileges.) Which was my original definition and is inline with the posted definition from Wikipedia.

                    • woodman 9 years ago

                      Well I guess we won't come to an agreement, because it seems that whatever reason you prefer a very loose definition. For example, you just couldn't help yourself in confusing the privilege escalation point: "...context with escalated privileges." The rootkit isn't escalating anything, in the same way that LKMs, bootloaders, tracetools, or drivers don't escalate - it executes at or below its own privilege level.

                      • jdmichal 9 years ago

                        I'm obviously not communicating my point well. Let's try this:

                        A backdoor executes in a remote machine. It allows attackers to access that machine.

                        A rootkit executes in a "remote" privileged context. It allows attackers to access that privileged context. It's in this context that I refer to escalation; it allows the attacker in a non-priviledged context access to a privileged context; aka escalation. And yes, the actual escalation already happened in the past, when the rootkit was installed. However, a non-priviledged user is still gaining illicit access to a privileged context at the moment that the rootkit is utilized.

                        Also, at this point I think we're splitting semantic hairs that don't really matter, aside from pedantry.

                        • woodman 9 years ago

                          Well I do appreciate you trying, but I disagree with you that it is pedantry that doesn't matter. This conversation is the best possible example of why we can't allow the corruption of previously well defined words - it causes confusion for no good reason.

                          A backdoor doesn't need to be remote and the user isn't necessarily an attacker. It is simply a secret method of access that the designer put in place, it isn't designed for end-user use. It is almost always security through obscurity, and it is always a bad idea. It can be activated in a variety of ways: port knocking, hardcoded passwords, preinstalled remote software, shorting ground to some magic pin, an undocumented serial terminal, etc.

                          A rootkit doesn't need to be remote and the user isn't necessarily an attacker. It doesn't need to have any functionality for user interaction - which means no "escalation" occurs (It could simply scan memory for passwords and log them to a file). It runs above user space, and can therefor be completely hidden (but it isn't always, see DTrace). It runs with the same privileges as the OS that it is part of. That is important to keep in mind, the rootkit becomes part of the running OS - that could mean any of the OSes running in your tower (CPU, HD firmware, BIOS, etc).

                          Your definitions work fine in a vacuum, but they quickly fall apart in real world usage. For example, by your definition: a remotely accessible privileged service is a rootkit, because an unprivileged internet user can interact with it - accessing data and executing code in the service's privileged context. 'sudo nginx' is not a rootkit.

                          • jdmichal 9 years ago

                            > A rootkit doesn't need to be remote and the user isn't necessarily an attacker.

                            No one said a rootkit needs to be remote. (I used "remote" in quotes just to align it to the backdoor.) And in the context of security, it is definitely an attack. If there's not a user executing unauthorized commands, then it's simply installed and authorized software.

                            > It doesn't need to have any functionality for user interaction...

                            This is true, and I can see how some of my statements were maybe a bit more specific about this than they needed to be. The point is still to give an attacker a context with elevated permissions; it need not be an interactive context.

                            > It runs with the same privileges as the OS that it is part of.

                            This I still think is overly restrictive. I don't think running in ring 0/1/2 with the kernel and drivers is a necessary component; having "root" access such that it can invoke kernel functionality necessary to achieve its goals is sufficient. Now, it may use "root" access to modify kernel files and drivers, which is perhaps what you're referring to and where the line blurs and pedantry beings. If "root" access gives you unfettered access to the system, including modifying kernel executable files, then there is basically no difference between "root" and ring 0.

                            > For example, by your definition: a remotely accessible privileged service is a rootkit, because an unprivileged internet user can interact with it - accessing data and executing code in the service's privileged context. 'sudo nginx' is not a rootkit.

                            More pedantry. Clearly intended and authorized access to a service is just normal operation. This is why I'm very explicit about the usage being unauthorized and label the user an "attacker".

                            • woodman 9 years ago

                              I think that we're as close as we'll get to agreeing - the main contention being the "attacker" part. I'd describe Symantic's data protection product as a rootkit, regardless of who installed it. I'd say the same for the LKMs that I've installed in honeypots.

                          • mordocai 9 years ago

                            I think you are spot on for rootkit, but you are absolutely wrong on backdoor.

                            You say "This conversation is the best possible example of why we can't allow the corruption of previously well defined words - it causes confusion for no good reason." when YOU(and others like you) are the one corrupting the meaning of backdoor.

                            Backdoor has meant for ages to be a way to access a computer/program while bypassing the normal authentication method, whether added by the designer or by someone else. You are trying to redefine it to mean only methods of bypassing normal authentication added by the designer. If you find it confusing that both types of backdoor are backdoors, then make up a new word that can be considered a subtype of backdoor don't try to coop an existing word and change its meaning.

                            • woodman 9 years ago

                              > ... whether added by the designer or by someone else.

                              Your exception seems to hing on the word designer. I'd describe the individual responsible placing the backdoor as the designer. So if you place a modified version of /usr/sbin/sshd, then you've designed the backdoor for that system. I see no redefinition.

                              • mordocai 9 years ago

                                Your post further up in the thread:

                                > Calling BO a backdoor is a major corruption of the word, as you loose the only word for describing intentionally weakened security - so that you may describe a thing which already has several more explicitly defining names: malware, trojan, dropper, etc.

                                Thinking in that context, it sounded like you were arguing further for the fact that backdoors should only be describing intentionally weakened security. Have you changed your mind about that?

                                • woodman 9 years ago

                                  > Have you changed your mind about that?

                                  No. Unlike a rootkit, context really matters in the case of a backdoor - not so much the implementation means. BO is no more a backdoor than vnc or sshd. Now if Dell decides to secretly package BO in their product line, then it is a backdoor.

                                  > ...backdoors should only be describing intentionally weakened security.

                                  I can't think of a backdoor that does not meet that description, do you have anything in mind?

          • codesterling 9 years ago

            There are too many "No, that's wrong"'s here for a bunch of people that aren't getting this quite correct. You do not need root access to install a rootkit, you simply need to exploit a security flaw that allows you to install, run, and avoid detection. This is easiest done by modifying the host to disable it's ability to even find you on the device. This is much more difficult on modern systems, so for most modern systems, they're installed as trojans using the privilege escalation of another application or install.

            The connotation difference is the difference between getting hit with a 10mm and a 9mm. Negligible, as it's leaving a hole that you really don't want there.

      • mhurron 9 years ago

        http://www.sqasolar.org.uk/solar/material/IS01CGCD/page_19.h...

        A rootkit can implement backdoor functionality, but not all rootkits are backdoors, and not all backdoors are rootkits.

      • duaneb 9 years ago

        No, it refers to different things. Back-door is a technique or practice and a rootkit is a type of malware. Rootkits often (but not always) install backdoors.

  • aidenn0 9 years ago

    BackOriface was called a "backdoor" back in the day, so I think the term is fine.

  • codesterling 9 years ago

    I don't like the use of backdoor for malicious cracks, as it confuses the argument between malware and bad security practices. Though technically, backdoor is the correct term.

  • takeda 9 years ago

    Backdoor is probably the correct term, I guess we just got used to vendor placed backdoors.

    Although I also assumed at first that it was vendor placed, even though I was familiar with backdoors from the past (Back Orifice, Sub7 etc)

    • Esau 9 years ago

      Then maybe we need a more defined term? Something like 1st-party backdoor vs 3rd-party backdoor?

  • matt-attack 9 years ago

    Perhaps some would enjoy some related humor while we're on the topic of backdoors:

    https://www.youtube.com/watch?v=cuYQ4qUEfEI

drinchev 9 years ago

Can someone explain how the vicim gets infected?

As far as I can read from the article they discuss what happens if you are infected.

Also, isn't running binary files on OS X from let's say "Finder" automatically triggers Security alert ( like App-vendor lock )?

  • alexbecker 9 years ago

    This isn't a virus, it's a payload. Once an attacker exploits a vulnerability to gain RCE, this is the kind of thing they might install (if their goal isn't to immediately trash the machine).

commentzz 9 years ago

I feel the use of 'backdoor' here is misleading.

The software described would usually be classified as an Advanced Persistent Threat [1] or Rootkit [2] Backdoor [3] usually refers to methods to sidestep authentication added by the vendor.

  1: https://en.wikipedia.org/wiki/Advanced_persistent_threat
  2: https://en.wikipedia.org/wiki/Rootkit
  3: https://en.wikipedia.org/wiki/Backdoor_(computing)
  • walrus01 9 years ago

    Many commenters are pointing out that one possible definition of a rootkit is something that elevates privilege, but does not necessarily have network communications functions or a command and control server. But in recent times, almost all modern rootkits seen in the wild have some form of network control functionality.

    • woodman 9 years ago

      A rootkit isn't for privilege escalation - you need root before you can install the rootkit. This is typically obtained through a privilege escalating exploit, the rootkit is for maintaining access and masking the attack.

  • stronglikedan 9 years ago

    I've heard the term "backdoor" used for a long time before "rootkit" or "advanced persistent threat", so it may be a generational thing.

    From https://en.wikipedia.org/wiki/Rootkit:

    > The modified compiler would detect attempts to compile the Unix login command and generate altered code that would accept not only the user's correct password, but an additional "backdoor" password known to the attacker...This exploit was equivalent to a rootkit.

    From https://en.wikipedia.org/wiki/Advanced_persistent_threat:

    > Establish Foothold – plant remote administration software in victim's network, create net backdoors and tunnels allowing stealth access to its infrastructure.

    From https://en.wikipedia.org/wiki/Backdoor_(computing):

    > A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems.

    I read all of that as a backdoor being an umbrella term, of which one type is a rootkit, and APTs create backdoors, perhaps of a type other than rootkit (e.g. net backdoor).

  • lawnchair_larry 9 years ago

    Nope, wrong. Backdoor has been in use for this since long before the silly "APT" acronym was coined.

  • callesgg 9 years ago

    Not misleading, incorrect.

epistasis 9 years ago

Really interesting to see a cross-platform malware with audio and video support; a lot of non-malware has difficulty with that.

  • chaosfox 9 years ago

    Qt makes that easy, thats why they are using it.

    • sitkack 9 years ago

      Me thinks it would be nice to scan for Qt at the `exec()` level. I don't have a huge use for Qt, it would be nice to have to white list apps that use it.

  • stephenr 9 years ago

    A lot of cross platform software that attempts audio/video (e.g. Skype etc) would be considered malware by some. Usually people who've had to use it at least once.

    • huhtenberg 9 years ago

      Anything can considered malware by some. The question of course is if it's a notable assessment or is it just these "some" having a random opinion.

    • kabdib 9 years ago

      Serious question: Is this snark, or does the software in question do sketchy things with privilege escalation that might be leveraged into attacks?

      I agree that much software has terrible UI, but it's good to distinguish surface stuff from objectively terrible security decisions.

      • Kliment 9 years ago

        I don't know whether this is still the case but Skype used to use some of the most advanced anti-debugging, runtime code obfuscation, etc etc methods of its time for no obvious reason. See http://www.secdev.org/conf/skype_BHEU06.handout.pdf for details. It certainly made people pause and think about what kind of shady stuff they were up to.

      • bdamm 9 years ago

        This is an excellent example of where user visibility into authorized processes could improve trust in software. Specifically, this software is ideal as a trojan horse; the user likely felt slightly coerced into installing it (install this plugin or you can't take part in this meeting / talk with love interest / remote family) and so they likely did so, possibly bypassing blessed trust sources. And even worse, the software is being granted privileges that are particularly ripe for abuse.

        So this would lead a reasonably paranoid person to conclude that such software would be the ideal vehicle for privacy violation. Thus, if ever there is a software package for which a user ought to have visibility and enhanced control, this would be it.

manarth 9 years ago

Not sure whether to be amused, vindicated, or concerned that the most prominent conversation here on HN is terminology: "Is 'backdoor' the correct term?"

Malware, trojan, virus, rootkit, backdoor, squirglebunny (OK, I may have made that last one up).

There's not a lot of talk about the threat vector though - does anyone know how this infects systems?

  • darylteo 9 years ago

    > After its first execution, the binary checks its own file path and ...

    From the article it seems to be via executable. That's why the terminology is important in this case. It's a executable rootkit that opens a backdoor, not a OS remote execution exploit. And this article relates to the OS X variant of a cross-platform package (so this affects Windows and Linux systems as well).

    • manarth 9 years ago

      > "It's a executable rootkit"

      I hate to join in the terminology argument, but is it really a rootkit? After all, it doesn't (according to the reports) disguise its presence, which discards "rootkit" as a classification.

      It seems to be pretty much run-of-the-mill malware. It would be interesting to understand the delivery mechanism (email, or whatever).

      And if people will install untrusted third-party software, delivered by an untrustworthy mechanism, then they inevitably accept a certain amount of exposure.

  • pawadu 9 years ago

    did you see last weeks post about bikeshedding? this is exactly what bikeshedding is.

baby 9 years ago

I came here to see a sophisticated backdoor. I left disappointed.

  • wruza 9 years ago

    Same thing. All comments are about backdoor vs rootkit vs malware vs etc, as if it was important. Hey guys, you really want me to go through a link and read that article myself? Where is the discussion? Where is tl;dr comment upvoted to the top?

snxss 9 years ago

What about ways to verify if you are infected or ways to remove?

chadlavi 9 years ago

Okay, but no information on what to do about it, or how to protect against it.

gre 9 years ago

Please clarify the title. It sounds like Apple put a backdoor into OSX.

  • acqq 9 years ago

    I suggest "sophisticated malware backdoor payload for OSX discovered." Then it's clear it's not a part of the OSX itself and that it's something that has to be somehow installed by some third party (e.g. using any malware installation method or a real spy).

tuxone 9 years ago

Kaspersky, the most paid and legalized backdoor ever commercialized, ruining web experience of the average user. Although I'm glad they discover interesting things, I would love they stop messing with third parties http connection and html pages.

givinguflac 9 years ago

I think it's pretty funny that they go through all the trouble of making this for MacOS, yet it searches for only MS Office file extensions and not Apple's iWork extensions. It also seems to me that this all hinges on having gatekeeper disabled.

saosebastiao 9 years ago

Is there any diagnostic tool out there to determine if you've been infected?

  • atdt 9 years ago

    I whipped up https://gist.github.com/atdt/e84483c70c078a72f5e08ead365c69f... based on the information in the report.

  • clinton_sf 9 years ago

    > Is there any diagnostic tool out there to determine if you've been infected?

    From what I can tell, they posted the SHA256 of the offending binary under the IOCs section of that web page. So you should be able to do this in the root of your home directory to detect if such a file exists:

    # find . -type f -print0 | xargs -0 shasum -a 256 | grep 664e0a048f61a76145b55d1f1a5714606953d69edccec5228017eb546049dc8c

    • drdrey 9 years ago

      Binary checksums are usually not very helpful for identifying malware. The fact that the binary they were looking at was called "unpacked" suggests that there would be packed versions out there, and they would have a different checksum.

      • clinton_sf 9 years ago

        Yes. And the malware could be polymorphic. Or there could be multiple versions of the same "core" out there. It's not clear to me how sophisticated virus (malware) scanners for OS X are with dealing with that.

        • lm2s 9 years ago

          From what I know (which is not much) scanners, among other things, search for identifying patterns in files. So there is an identifying pattern of each discovered malware/virus in a database.

  • Chilinot 9 years ago

    I assume this has been added to Kaspersky's anti-virus suite considering it is their blog post.

  • 20yrs_no_equity 9 years ago

    Apple keeps gatekeeper and another process up to date, effectively scanning for this kind of stuff is built into the OS.

_Codemonkeyism 9 years ago

Looks like it's not only OS X - the OS X variant is newly discovered.

Title should be 'OS X Variant of Backdoor Discovered', shouldn't it?

"OS X variant of a cross-platform backdoor which is able to operate on all major operating systems (Windows,Linux,OS X). Please see also our analysis on the Windows and Linux variants."

toyg 9 years ago

That list of directories is really weird. On my machine, none of them exists, neither in ~/Library nor /Library. And I do run most of that software (Dropbox, Skype, Firefox, Chrome in the past...).

Either the malware targeted very old versions of such software and/or OSX, or somebody between the malware author and the blog writer f###ed up.

  • richardwhiuk 9 years ago

    The aim is to look legitimate, but not clobber applications - merely to look like something the user shouldn't delete.

    • toyg 9 years ago

      But the post says that the malware checks if any of those folders exists, only then writing the necessary plist. By your reasoning, one of these folders should have been created in advance by another process. So this "backdoor" is even incomplete...

      • sordidfellow 9 years ago

        It says it checks if those folders are available - which could mean checking if the name is not already taken, and then creating the path for itself to use.

      • djrogers 9 years ago

        > But the post says that the malware checks if any of those folders exists

        Presumably so it doesn't re-infect an already compromised host

marmot777 9 years ago

I'm curious why my Malware app wouldn't be on top of this? I did a search for it here: https://blog.malwarebytes.com/threats/

Is it too new a threat? Outside the scope of my Malware app?

mrmondo 9 years ago

1. This is not a backdoor, it's malware or an exploit.

2. This is not specific to OS X, it affects many operating systems, so this sounds like an attempt at slandering software that someone doesn't like, or has a reason not to like.

Mizza 9 years ago

Are video captures actually possible? I could imagine video capture as part of a RAT, but what scares me is the idea of video capture that doesn't turn on the camera activity light. Are there any examples of that?

  • jobu 9 years ago

    It was definitely possible a couple years back - https://jscholarship.library.jhu.edu/handle/1774.2/36569

    We describe how to disable the LED on a class of Apple internal iSight webcams used in some versions of MacBook laptops and iMac desktops. This enables video to be captured without any visual indication to the user and can be accomplished entirely in user space by an unprivileged (non- root) application.

    • landr0id 9 years ago

      > It was definitely possible a couple years back

      Yeah, a few years back studying MacBooks from 2008.

      • strictnein 9 years ago

        Have they been updated since then?

        • landr0id 9 years ago

          Assuming this is a serious question, yes, the camera and MacBooks both have changed a lot since 2008. This is probably why they did the study on 2008 MacBooks as opposed to later models. They wouldn't get the results they wanted otherwise.

  • stephenr 9 years ago

    I don't know that it's possible on recent Apple hardware. I remember reading somewhere that the green LED is triggered by the camera power line, or something along those lines.

    • cptskippy 9 years ago

      That's how it should be however that's not how it is for all web cameras. I don't know specifics about Apple.

      • nitrogen 9 years ago

        Note to anyone developing a new webcam: if you want to be able to flash your LED to indicate something to the user, add another color, and keep the main LED tied to the power line (ideally with a hardware-implemented delayed shutoff on the power so a single-frame grab lights the LED for a long time).

  • semi-extrinsic 9 years ago

    IDK about current gen Apple hardware, but it was possible to do so on a 2008 MacBook, at least (academic paper and PoC app):

    https://jscholarship.library.jhu.edu/bitstream/handle/1774.2...

    Interestingly, on my battered, el cheapo Asus 12" netbook (2011 Intel Atom), this problem is solved very well: the on/off webcam switch physically blocks the webcam lens in the off state.

  • stephenr 9 years ago

    The article only includes the word "Video" once in the summary, but then mentioned screen captures every 30 seconds.

    I'm guessing that is what the summary is referring to when it says "video capture", because there is no other reference to video or camera.

  • wepple 9 years ago

    I'm going to dig into this and find out, I've wanted to know for ages.

    If the LED == LED_TORCH, then it looks like it may be possible:

    https://github.com/patjak/bcwc_pcie/blob/8cc44d67f3c924f30a8...

    Either way, I'm planning on buying some spare parts to actually test and possibly PoC this.

  • rurban 9 years ago

    Apparently this malware doesn't take webcam screenshots (as law inforcement illegally does). It just takes screenshots, possibly to match keystrokes to the window, to be able to match password entries to the application or url. And then exploit that furtheron. I wonder why it takes audio captures though? Just for the thrill? Or is it the government?

  • njloof 9 years ago

    Be safe and do as Mark Zuckerberg does -- stick a Post-It™ over the camera lens.

coldcode 9 years ago

Useless article makes no mention of how this gets into the system at all. Plus its not all that sophisticated or a backdoor. Nor do they point out that Apple was notified before posting this.

throwanem 9 years ago

I like how the images all jump a centimeter to the left on mouseover! Makes the page feel exciting.

bronz 9 years ago

so has this been patched for windows?

jesalg 9 years ago

This sounds a lot like the zero-day exploit used in the show Mr.Robot. Life imitating art.

  • niij 9 years ago

    I think Mr. Robot is art imitating life. Life, if course, being exploits like these.

    • jesalg 9 years ago

      Well I think the show depicted something like this before it became public knowledge. But point taken, they were inspired by similar exploits.

  • intoverflow2 9 years ago

    How so? This isn't an exploit it's a piece of malware

yuja_wang 9 years ago

I thought MacOS was "Secure By Design". This is what Apple states in their official product descriptions.

In fact, it says it on this current page:

http://www.apple.com/business/mac/

"Because OS X is secure by design, there’s no need for IT to install additional tools or lock down functionality for employees. And with an automated zero-touch deployment process, they don’t even have to open the box."

  • freehunter 9 years ago

    By that level of standard, nothing is secure. Linux has vulnerabilities. Windows has vulnerabilities. I have a deadbolt on my door and the package read "Keep your home secure!" but someone could still get through if they really wanted to.

    "Secure by design" doesn't mean 100% secure no matter what. Part of that design is the update/patch process that addresses vulnerabilities quickly, and mitigating controls like lower default permissions and application signing.

    The fact that you're so quick to call everyone an astroturfer because you made a ridiculous statement just proves that your only interest is trolling.

  • mhurron 9 years ago
  • spullara 9 years ago

    If your IT team decides to enable Apple's controls, there will be no way to install this on your machine.

  • kyriakos 9 years ago

    I think that myth got shot down years ago. Along with magical and courageous marketing terms.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection