May 2, 2017 By Larry Loeb 2 min read

It shouldn’t really be a surprise when a Mac is attacked via malware. Admittedly, the larger number of Windows systems in use has influenced the route that cybercriminals usually choose, which typically meant fewer occurrences of Mac malware. But, despite the lower numbers of Mac systems, 9to5Mac reported that Mac-targeted attacks rose 744 percent in 2016 Q4, according to data from McAfee Labs.

A New Mac Malware

Checkpoint Software found a new example of malware infecting German users. It is part of a major effort, made up of several different schemes.

Dok, as it is called, is able to totally take over a Mac until the infection process is complete and then erase itself. Attackers will gain complete access to all the victim’s communication, including communication that is SSL encrypted — a particular trick done by redirecting traffic through a malicious proxy server. Bleeping Computer reported the malware had a zero percent detection rate on VirusTotal when it was discovered.

The virus starts off as a malicious attachment in a phishing email. When the attached Dokument.zip is opened, it first sets up a fake login item in the AppStore. That ensures persistence of the malware when the computer is restarted.

In the second phase, a fake window asserts that new OSX updates are available for download. It may stop all other windows from becoming active while displayed. Clicking the window’s OK button brings up a dialog box the user is directed to fill in, providing the Mac’s administrative password.

Once it has that password, Dok goes to town, installing a new root certificate. It also changes the network settings so all outgoing connections must pass through a proxy. That proxy is dynamically changed using a Proxy AutoConfiguration (PAC) file, which sits on a malicious server.

Bringing in Basic Security Practices

Certain preventable actions are necessary for this malware scheme to succeed. For example, users should not to click on unknown attachments, which applies to a lot of malware attacks. Secondly, they should not give an unknown dialog box the system’s administrative password. A page that tries this is nonstandard, which serves as a dead giveaway.

Ultimately, the question is, “How did the malware get a valid developer certificate?” There is a feature called GateKeeper on Macs that stops unknown programs from running unless a valid certificate is present. Yet, this malware somehow bypassed the security feature.

Apple needs to carefully check its entire issuance process so this doesn’t happen again, as well as immediately revoke the malware’s certificate.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today