AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() The distribution is active since at least 2015, indicated security firm SentinelOne in a report published this week. The malware has been researched in the past, but the run-only AppleScript file. From what data we have it appears to be mostly targeted at Chinese/Asia-Pacific communities.” “OSAMiner has been active for a long time and has evolved in recent months. Red Siege Information Security JanuNamed OSAMiner, the malware has been distributed in the wild since at least 2015 disguised in pirated (cracked) games and software such as League of Legends and Microsoft Office for Mac. Incidentally, security researchers weren’t able to retrieve the malware’s entire code when they had sensed its activities back in 2018. This was because the malware used nested run-only AppleScript files to retrieve its malicious code across different stages.ĪppleScripts arrive in a compiled state. ![]() In other words, the source code isn’t human-readable. #Macos runonly applescripts avoid detection for code# Although a heightened security measure, this makes analysis a lot harder for external or third-party security researchers. How did the malware infect and spread on an Apple macOS computer?Īs mentioned earlier, the OSAMiner malware creators depended heavily on the distribution, download, and widespread use of illegally obtained and cracked software. #Macos runonly applescripts avoid detection for cracked# As piracy is common in Southeast Asia, the malware was quite active in these regions. It seems the creators of the malware obtained different variants of pirated software and injected the malware inside. Incidentally, the malware’s initial size was quite small. Mac malware OSAMiner has released a variant that uses multiple 'run-only' AppleScripts, making it difficult to detect and analyze. Īs users installed the pirated software, the malware installer would silently download and run a run-only AppleScript. This script would silently download and run a second run-only AppleScript, and then another final third run-only AppleScript. Apparently, the third AppleScript contained the actual OSAMiner malware or “payload”. SentinelOne macOS malware researcher Phil Stokes has published a detailed report. It reveals the full-chain of this attack, along with Indicators Of Compromise (IOCs) of past and newer OSAMiner campaigns. However, it is quite clear that using pirated software will ensure the malware continues to have vulnerable Apple macOS computers. #Macos runonly applescripts avoid detection for code#.#Macos runonly applescripts avoid detection for software#.#Macos runonly applescripts avoid detection for cracked#.
0 Comments
Read More
Leave a Reply. |