Gatekeeper won’t stop this ‘major scale’ Mac malware

By

The OSX/Dok malware forces you to install a bogus OS X update.
The OSX/Dok malware forces you to install a bogus OS X update.
Image: Check Point

OSX/Dok, a new strain of “major scale” malware targeting macOS users, can bypass the Gatekeeper feature that’s designed to block malicious software.

The newly identified trojan, which prevents you from doing anything on your Mac until you install a bogus software update, also goes undetected by many antivirus programs.

As the macOS user base grows, so does the malware that targets it. According to McAfee Labs, malware attacks designed for Mac computers rose 744 percent in 2016, with almost 460,000 samples discovered. The latest is particularly worrisome.

Uncovered by security researches at Check Point, OSX/Dok can hit all versions of macOS and OS X. It wasn’t recognized by antivirus databases when it was first discovered, and it is considered by be the first “major scale malware” to target Mac users.

OSX/Dok malware targets all Macs

The most troublesome aspect of this malware? It is signed with a valid developer certificate that’s been authenticated by Apple, which means macOS doesn’t see it as a threat and it isn’t blocked by Gatekeeper. The certificate is dated April 21, 2017.

“Once OSX/Dok infection is complete, the attackers gain complete access to all victim communication, including communication encrypted by SSL,” explains Check Point. “This is done by redirecting victim traffic through a malicious proxy server.”

The malware is being distributed primarily in Europe via phishing emails that encourage users to download a file that details supposed inconsistencies in their tax returns. That file is named “Dokument.zip” when distributed among users in Germany.

How OSX/Dok Mac malware works

When you open it, the malware copies itself to the /Users/Shared folder, then proceeds to execute itself automatically. It also removes any trace of the original download from the Downloads folder, and presents an error message that hopes to convince users the file “could not be opened.”

Little do they know that the malware has added itself as a Login Item with the name “AppStore,” which runs automatically when they first start up their Macs. It will continue to execute every time an infected Mac is started up until it has successfully installed its payload.

“The malicious application will then create a window on top of all other windows. This new window contains a message, claiming a security issue has been identified in the operating system that an update is available, and that to proceed with the update, the user has to enter a password.”

Once you have received this popup, you cannot do anything with your Mac until you agree to install the bogus update. And of course, entering your password provides the malware with administrator privileges and it can continue the next phase of its assault.

That includes installing a package manager that downloads and installs additional tools, and providing the existing user account with admin privileges immediately without the need to enter a password. It also alters network settings to ensure all outgoing connections pass through a proxy.

What OSX/Dok Mac trojan does

Of course, that proxy sits on a malicious server on the “dark web,” and every piece of data that passes through it gets collected.

“As a result of all of the above actions, when attempting to surf the web, the user’s web browser will first ask the attacker web page on TOR for proxy settings,” Check Point says.

“The user traffic is then redirected through a proxy controlled by the attacker, who carries out a Man-In-the-Middle attack and impersonates the various sites the user attempts to surf. The attacker is free to read the victim’s traffic and tamper with it in any way they please.”

Once the attacker has obtained the information they want, the malware will remove itself from the infected machine. The user has no idea what was going on in the background until it’s too late.

Via: The Hacker News

Deals of the Day

9 responses to “Gatekeeper won’t stop this ‘major scale’ Mac malware”

  1. TrueNorth_Steve✓ᴰᴱᴾᴸᴼᴿᴬᴮᴸᴱ says:

    how do you remove it?

    • Richard Liu says:

      Remove the “com.apple.Safari.proxy.plist” and “com.apple.Safari.pac.plist” from ~/Library/LaunchAgents.

      This malware will also install Xcode Command Line Tool and Homebrew. These can not be easily remove. However, these are standard tools for programmer and system administrators under Terminal. They’ll neither do harm to your system nor consumes any system resources, so just leave them there.

  2. jamesdbailey says:

    All Apple has to do is revoke the developer cert. Problem solved.

  3. Stephen Huxtable says:

    So you open a dodgy email and launch a dodgy executable. People who do this deserve all they get.

  4. Xeromedm says:

    …and what if the user does not have admin rights to the machine?

    • Richard Liu says:

      Then it won’t be functional. This malware requires sudo privilege to install Xcode CLT and Homebrew. By default only the administrator will be added to /etc/sudoers.

  5. Richard Liu says:

    Clickbait.

Leave a Reply

Your email address will not be published. Required fields are marked *