#malware

tresronours@parlote.facil.services

macOS Infostealers That Actively Involve in Attacks Evade XProtect Detection

Ever since the beginning of 2023, infostealers targeting macOS have been on the rise with many threat actors actively targeting Apple devices. As of last year, many variants of Atomic Stealer, macOS meta stealer, RealStealer, and many others were discovered.

However, Apple updated their built-in antivirus “XProtect” signature databases in macOS which denotes that Apple is completely aware of these info stealers and has been taking necessary measures to prevent them. On the other side, threat actors have been constantly evolving and evading known signatures.

Free Webinar

Fastrack Compliance: The Path to ZERO-Vulnerability

Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month. Delays in fixing these vulnerabilities lead to compliance issues, these delay can be minimized with a unique feature on AppTrana that helps you to get “Zero vulnerability report” within 72 hours.

Register for Free

Technical Analysis – The Three Active Infostealers

According to the reports shared with Cyber Security News, Keysteal, Atomic InfoStealer, and CherryPie were three active infostealers that presently evade many static signature detection engines including XProtect.

KeySteal

This stealer was first discovered in 2021 and has been constantly evolving with evasion techniques. Some of the distributions of this malware were under the binary name “ChatGPT”. Apple added a signature for this malware in 2023 inside XProtect which no longer works.

Recent sample of KeyStealRecent sample of KeySteal (Source: [*SentinelOne](https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/))*

During the initial stages of this Keysteal, it was distributed with a .pkg format embedded inside the “ReSignTool” macOS utility. It is coded in such a way to steal Keychain information which holds a lot of sensitive password information and establish persistence on the affected device.

The latest version of KeySteal replaces “ReSignTool” with multi-architecture Mach-O binaries under the names “UnixProject” and “ChatGPT”. The malware is written in Objective C and current distribution methods are unclear.

Atomic Infostealer

Apple updated their XProtect Signature databases for detecting this malware earlier this month. But it seems like threat actors have up-to-date information about the signature detection and have modified the malware with a Go language version shortly after the signature update.

In addition to this, this malware has been seen with completely different development chains, unlike other infostealers which update only the core version. There have been several variations of this malware currently in the wild attacking macOS devices.

Another bunch of

[

#Amos

](https://twitter.com/hashtag/Amos?src=hash&ref_src=twsrc%5Etfw)

[

#AtomicStealer

](https://twitter.com/hashtag/AtomicStealer?src=hash&ref_src=twsrc%5Etfw)

samples that evade the recent

[

#XProtect

](https://twitter.com/hashtag/XProtect?src=hash&ref_src=twsrc%5Etfw)

v2178 SOMA_E signature.

[

#apple

](https://twitter.com/hashtag/apple?src=hash&ref_src=twsrc%5Etfw)

[

#security

](https://twitter.com/hashtag/security?src=hash&ref_src=twsrc%5Etfw)

[

#malware

](https://twitter.com/hashtag/malware?src=hash&ref_src=twsrc%5Etfw)[

https://t.co/m3ubSlopDU

](https://t.co/m3ubSlopDU)

[

pic.twitter.com/MPhMavJM3S

](https://t.co/MPhMavJM3S)

— Phil Stokes ⫍🐠⫎ (@philofishal)

[

January 12, 2024

](https://twitter.com/philofishal/status/1745807753531011096?ref_src=twsrc%5Etfw)

The malware is written in C++ and consists of logic to prevent victims, analysts, or malware sandboxes from running the terminal in parallel with the stealer. Furthermore, it also checks if the malware is being tested inside a virtual machine.

The distributions of this malware were through torrents or gaming-focused social media platforms appearing as a “CrackInstaller” with the .dmg format.

GateKeeper Override by Atomic Stealer GateKeeper Override by Atomic Stealer (Source: [*SentinelOne](https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/))*

CherryPie

This infostealer malware is also known as Gary Stealer or “JaskaGo” which is a cross-platform malware written in Go with extensive logic for anti-analysis and VM detection. However, the malware developers seem too confident that they left extremely obvious strings which indicate the core intent and purpose of this malware.

CherryPie attempts to disable GateKeeper CherryPie attempts to disable GateKeeper (Source: [*SentinelOne](https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/))*

In some samples, there were traces of using the Wails project for bundling their malicious application. During the execution of this malware, the application calls the spctl utility with the –master-disable argument for disabling the Gatekeeper and runs with administrative privileges.

Furthermore, a complete report about this malware has been published which provides detailed information about the source code, behavior, intent, and other information.

Indicators of Compromise

KeySteal

  • 95d775b68f841f82521d516b67ccd4541b221d17

  • f75a06398811bfbcb46bad8ab8600f98df4b38d4

  • usa[.]4jrb7xn8rxsn8o4lghk7lx6vnvnvazva[.]com

Atomic InfoStealer

  • 1b90ea41611cf41dbfb2b2912958ccca13421364

  • 2387336aab3dd21597ad343f7a1dd5aab237f3ae

  • 8119336341be98fd340644e039de1b8e39211254

  • 973cab796a4ebcfb0f6e884025f6e57c1c98b901

  • b30b01d5743b1b9d96b84ef322469c487c6011c5

  • df3dec7cddca02e626ab20228f267ff6caf138ae

CherryPie

  • 04cbfa61f2cb8daffd0b2fa58fd980b868f0f951

  • 09de6c864737a9999c0e39c1391be81420158877

  • 6a5b603119bf0679c7ce1007acf7815ff2267c9e

  • 72dfb718d90e8316135912023ab933faf522e78a

  • 85dd9a80feab6f47ebe08cb3725dea7e3727e58f

  • 104[.]243[.]38[.]177

Looking for cost-effective penetration testing services? Try Kelltron’s to assess and evaluate the security posture of digital systems – Free Demo

The post macOS Infostealers That Actively Involve in Attacks Evade XProtect Detection appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
posted by pod_feeder

fefebot@pod.dapor.net

[l] Was passiert, wenn die britische Atomruine Sellafield von Malware befallen wird?

Jahrelange Vertuschung.

But sources said breaches were first detected as far back as 2015, when experts realised sleeper malware – software that can lurk and be used to spy or attack systems – had been embedded in Sellafield’s computer networks.

Ja gut, das ist eine Atomruine. Was würden ausländische Hacker da wollen?

The site has the largest store of plutonium on the planet and is a sprawling rubbish dump for nuclear waste from weapons programmes and decades of atomic power generation.

Sonst noch was?

Guarded by armed police, it also holds emergency planning documents to be used should the UK come under foreign attack or face disaster.

#fefebot #malware

california@diaspora.permutationsofchaos.com

If you want to be a hacker try to understand this article in detail ...

In-Depth #Analysis of July 2023 #Exploit Chain Featuring #CVE-2023-36884 and #CVE-2023-36584
https://unit42.paloaltonetworks.com/new-cve-2023-36584-discovered-in-attack-chain-used-by-russian-apt/

Why should you care?
* Get a peek into #malware reverse engeneering
* Learn about weaponizing #attack chaining and other evils of a succesful attack
* Understand #Windows client leaks
* Exposure to #Wireshark, #pcap, #procom, ...
* Relevance for Windows #Security Zones, Mark of the Web (MotW)
* ...


#internet #hacker #hack #education #knowledge #coding #web

mlansbury@despora.de

Mozilla’s first-ever Annual Consumer Creep-O-Meter

In 2023, the state of our digital privacy is: Creepy

In addition to the Annual Consumer Creep-O-Meter score, you can also take a quiz to determine your own privacy footprint.

From the link below, select which popular products you own. We’ll weigh their privacy features and flaws, then show how well or poorly your devices and apps protect your personal information.

https://foundation.mozilla.org/en/privacynotincluded/articles/annual-creep-o-meter/?utm_source=Diaspora

#Privacy #creepy #Mozilla #digital #DigitalPrivacy #spyware #malware #CreepOMeter #spying #eavesdropping

anonymiss@despora.de

A Deep Dive into 70 Layers of Obfuscated Info-Stealer #Malware

source: https://medium.com/checkmarx-security/a-deep-dive-into-70-layers-of-obfuscated-info-stealer-malware-bdeeac0f04db

This #Python malware is a complex threat in the world of cyber threats. It goes to great lengths to hide its tracks, disable security measures, and exfiltrate a plethora of personal and sensitive information. Its multiple layers of obfuscation and multifaceted approach make it a noteworthy subject of study for security researchers and a serious concern for end-users alike.

#software #cybersecurity #security #threat #internet #news

anonymiss@despora.de

One of the #FBI’s most wanted hackers is #trolling the U.S. #government

Source: https://techcrunch.com/2023/09/18/fbi-most-wanted-hacker-trolling-the-u-s-government/

#Matveev’s online shenanigans, which include giving lengthy interviews to #cybersecurity journalists, posting selfie videos of himself driving around while listening to Metallica, and writing about his #hacking activities, show that he does not seem to care about being on the FBI’s most wanted list. And as long as he doesn’t leave #Russia, his life may not be that much different that it was before he got indicted.

#news #cybercrime #hack #hacker #malware #police #justice #troll #usa

fefebot@pod.dapor.net

[l] Ich habe heute die Rausschmeißer-Keynote bei der MCTTP gehalten, einer neuen Security-Konferenz in München, die den Anspruch hat, Hack in the Box und Blackhat Konkurrenz zu machen. Für die erste Iteration einer Konferenz war das eine verdammt gute Konferenz, fand ich.

In meinem Vortrag habe ich über die Architektur hinter meinem Blog gesprochen. Also: gatling, blog.cgi und tinyldap. War eine Keynote, kein technischer Vortrag, und am Ende der Veranstaltung hat eh keiner mehr Kraft für tiefschürfende technische Ausführungen.

Aber es hat mich zum Nachdenken gebracht. Meine ganzen Projekte sind inzwischen alle ziemlich alt. Waren die eigentlich ein Erfolg? Wie definiert man überhaupt Erfolg bei sowas?

Kürzlich wies mich ein Leser auf diese Analyse einer russischen Malware hin, in der der Analyst meine dietlibc gefunden hat. Also SO einen krassen Fall von GPL-Verletzung hatten wir ja schon lange nicht mehr! Ich verlange die Herausgabe des Quellcodes!!1!Schön ist das natürlich nicht, wenn mit meiner Library irgendwelche Trojaner geschrieben werden. Auf der anderen Seite aber auch irgendwie ein Ritterschlag. Wenn du willst, dass dein Trojaner auf allen Distros funktioniert, auch mit echt alten Kernels, dann gibt es schlechtere Wahlen als dietlibc. :-)

Tja, und dann habe ich mal ins cvs log von tinyldap geguckt. Der erste Checkin von Makefile war im Januar 2002. Über 20 Jahre her! Wie die Zeit vergeht.

Am Ende ist tinyldap das Projekt, das mir am meisten gebracht hat. ASN.1 ist kein abstraktes Mysterium mehr für mich. LDAP auch.

Auf Platz 2 vom Lerneffekt her ist dietlibc. Wo ich früher häufig irgendwas fummeln musste, kenne ich jetzt die obskure libc-Funktion, die genau das erledigt.

Unter dem Strich hat mir das derartig viel Erfahrung gebracht, dass ich die Projekte auch als großen Erfolg werten würde, wenn die außer mir nie jemand eingesetzt hätte.

dietlibc könnte ihre größte Popularität sogar noch vor sich haben. Wenn die Leute merken, dass man nicht Go benutzen muss, wenn man Binary haben will, das ohne weitere Abhängigkeiten einfach lauffähig ist. Ein Docker-Image aus nur einem Binary ist im Moment praktisch ein Monopol von Go. Das könnte man genau so gut mit dietlibc machen, oder von mir aus mit musl-libc.

Kann eigentlich nicht mehr lange dauern, bis den üblichen Verdächtigen unter den Microservice-Leuten das auffällt. Any day now.

Tsja. Auf die nächsten 20 Jahre!

#fefebot #malware #trojaner

diane_a@diasp.org

Block ads on your networks now.

The system designed to follow us around the net with ads is now a blinking #nationalsecurity & #humanrights threat.

And the incentives are all wrong. From platforms to publishers & ad networks they've spent every effort to make sure those ads get to our devices.

Now, predictably, the tech is going to dictators & being used to hack us.

#cybersecurity #hacking #spyware #malware #surveillance #advertising
Story: https://www.haaretz.com/israel-news/2023-09-14/ty-article-magazine/.highlight/revealed-israeli-cyber-firms-developed-an-insane-new-spyware-tool-no-defense-exists/0000018a-93cb-de77-a98f-ffdf2fb60000

anonymiss@despora.de

#Microsoft is using malware-like pop-ups in #Windows 11 to get people to ditch #Google

source: https://www.theverge.com/2023/8/30/23851902/microsoft-bing-popups-windows-11-malware

Windows isn’t freeware, it requires a license that almost every consumer ultimately pays for. That could be in the form of the price of a laptop that has a Windows OEM license baked in, or a product key if you built your own PC. Microsoft should respect the fact that people already pay for Windows and don’t want ads shoved down their throats. Windows is an important productivity tool for many people, and shouldn’t be treated like a cheap streaming box loaded with ads.


#software #OS #fail #economy #Bing #news #problem #advertisement #malware

fefebot@pod.dapor.net

[l] Aus der gleichen Denkschule wie "wir wurden von Malware angegriffen", jetzt neu: „Uns ist tatsächlich leider das gleiche Problem, was wir gestern hatten, wieder passiert.“Probleme passieren halt. Wir können nur reagieren. Statt Vorbeuge machen wir lieber Telemetrie und sind dann wenigstens wohlinformiert, wenn wir wieder "Opfer" von "Angriffen" werden.

Bonus: Natürlich ist man dann nicht wohlinformiert. Die meiste Telemetrie versandet in irgendwelchen Sofaritzen.

#fefebot #malware