iPad&iPhone user

Mac malware spies on encrypted browser traffic

Researcher­s found a new malware program for macOS that performs man-in-the-middle attacks, writes Lucian Constantin

-

Anew malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive informatio­n. Dubbed OSX/Dok by researcher­s from Check Point Software Technologi­es, was distribute­d via email phishing campaigns to users in Europe.

One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.

What makes OSX/Dok interestin­g is that it was digitally signed with a valid Apple developer certificat­e. These certificat­es are issued by Apple to members of its developer program and are needed to publish applicatio­ns in the official Mac App Store.

Applicatio­ns signed with an Apple-issued developer certificat­e can also be installed on the latest versions of macOS without triggering security errors or requiring manual overrides, so it’s not hard to see why this would be valuable to a malware program. It’s not clear if Dok’s creators paid to obtain a developer certificat­e by joining Apple’s developer program with a fake identity or if they stole the certificat­e from a legitimate developer.

Once installed on a Mac, OSX/Dok displays a fake and persistent notificati­on about a system security update that needs to be installed. Users who agree to install the update will be prompted for their administra­tor password.

Once the malware obtains elevated privileges, it will make the active user a permanent administra­tor so the OS will never ask for the password again when the malware executes privileged commands in the background.

Dok will also modify the system’s network settings to route web traffic through a proxy server controlled by the attackers and located on the Tor anonymity network. In order for this to work, it also installs a Tor client that’s started automatica­lly. The reason why web traffic is routed through a proxy server is to perform a man-in-the-middle (MitM) attack and decrypt secure HTTPS connection­s. This

 ??  ??

Newspapers in English

Newspapers from Australia