Malicious actors launched the first publicly observed attack campaign where they successfully flew under the radar of Apple’s notarization mechanism to target macOS users with Apple malware — in this case, OSX.Shlayer.

Inside the Attack Campaign

The attack campaign attracted the attention of the security community on Aug. 28, 2020, according to Objective-See.

College student and security researcher Peter Dantini noticed that when a user visited homebrew[dot]sh, a fake domain impersonating the Homebrew missing package manager for macOS and Linux, the campaign displayed a prompt for the user to install an Adobe Flash Player update after carrying them through several redirects.

In the event the user clicked the update, the campaign implemented various commands via bash to install an OSX.Shlayer payload on the victim’s computer. This threat then proceeded to install various adware payloads onto the infected machine.

Where Apple Notarization Mechanism Came In

The campaign described above wasn’t unusual at face value. It’s not the first time malicious actors used a fake Adobe Flash Player update to prey upon macOS users. It also wasn’t the first time OSX.Shlayer showed up in a digital attack.

On the contrary, OSX.Shlayer is a regular player in the Apple malware threat landscape. It’s been masquerading as an Adobe Flash Player update since Intego first spotted it in February 2018. A year later, Carbon Black’s Threat Analysis Unit (TAU) came across some new samples of the malware disguised as Adobe Flash update software. Many of those samples’ Apple Disk Images (DMGs) contained the signature of a real Apple developer and used legitimate system applications to target users of macOS versions 10.10.5 to 10.14.3.

OSX.Shlayer kept going into 2020. After being named by Kaspersky as the “most common threat on the macOS platform” in 2019, OSX.Shlayer attracted the attention of Intego in June 2020 by spreading through malicious Google search results. Some months later, SentinelOne uncovered ZShlayer, a new variant of the well-known macOS threat.

What set this threat apart was that its adware payloads were notarized by Apple. As explained on Apple’s website, the tech giant uses notarization as a means to automatically scan software for malicious content. This process helps to protect users against Apple malware and assuage their fears when running software they’ve downloaded from the Internet.

In this campaign, the malicious actors managed to get their payloads notarized via the spctl command. This enabled the payloads to run on a macOS computer without raising users’ fears.

Objective-See reported the issue to Apple on Aug. 28, 2020, and revoked the developer code-signing certificates used to sign the payloads. However, the campaign was still live, serving up new notarized payloads, on Aug. 30, 2020.

How to Defend Against Apple Malware Like OSX.Shlayer

Organizations can protect themselves against crafty malware, such as OSX.Shlayer, by largely following best practices that can help keep them safe from ransomware. They should begin by building a security-aware culture that uses ongoing awareness training to educate their employees about social engineering techniques, including the use of Adobe Flash Player malware, to target them. They also should use technical controls as part of an endpoint detection and response (EDR) strategy. These security measures will help them to monitor for suspicious activity on their endpoints and lead to Apple malware removal.

Finally, organizations need to make sure they have insight into some of the latest attack campaigns. The only way they can do that is by maintaining streams of threat intelligence on which their security teams can draw.

More from

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort. Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker…

Operational Technology: The evolving threats that might shift regulatory policy

Listen to this podcast on Apple Podcasts, Spotify or wherever you find your favorite audio content. Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022 — a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure. Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are…

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge. Understanding Attack Surface Management Here…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor…