May 2, 2017 By Larry Loeb 2 min read

It shouldn’t really be a surprise when a Mac is attacked via malware. Admittedly, the larger number of Windows systems in use has influenced the route that cybercriminals usually choose, which typically meant fewer occurrences of Mac malware. But, despite the lower numbers of Mac systems, 9to5Mac reported that Mac-targeted attacks rose 744 percent in 2016 Q4, according to data from McAfee Labs.

A New Mac Malware

Checkpoint Software found a new example of malware infecting German users. It is part of a major effort, made up of several different schemes.

Dok, as it is called, is able to totally take over a Mac until the infection process is complete and then erase itself. Attackers will gain complete access to all the victim’s communication, including communication that is SSL encrypted — a particular trick done by redirecting traffic through a malicious proxy server. Bleeping Computer reported the malware had a zero percent detection rate on VirusTotal when it was discovered.

The virus starts off as a malicious attachment in a phishing email. When the attached Dokument.zip is opened, it first sets up a fake login item in the AppStore. That ensures persistence of the malware when the computer is restarted.

In the second phase, a fake window asserts that new OSX updates are available for download. It may stop all other windows from becoming active while displayed. Clicking the window’s OK button brings up a dialog box the user is directed to fill in, providing the Mac’s administrative password.

Once it has that password, Dok goes to town, installing a new root certificate. It also changes the network settings so all outgoing connections must pass through a proxy. That proxy is dynamically changed using a Proxy AutoConfiguration (PAC) file, which sits on a malicious server.

Bringing in Basic Security Practices

Certain preventable actions are necessary for this malware scheme to succeed. For example, users should not to click on unknown attachments, which applies to a lot of malware attacks. Secondly, they should not give an unknown dialog box the system’s administrative password. A page that tries this is nonstandard, which serves as a dead giveaway.

Ultimately, the question is, “How did the malware get a valid developer certificate?” There is a feature called GateKeeper on Macs that stops unknown programs from running unless a valid certificate is present. Yet, this malware somehow bypassed the security feature.

Apple needs to carefully check its entire issuance process so this doesn’t happen again, as well as immediately revoke the malware’s certificate.

More from

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern.On October 2, 2024, the NSA (National Security Agency) released a new CSI titled “Principles of Operational Technology Cybersecurity.” This new guide was created in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD SCSC) to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today