'Dumb' malware targets MacOS devices by getting cryptocurrency users to infect themselves

Attackers lure users on cryptocurrency forums into downloading a massive binary that grants them backdoor access

Attackers are targeting cryptocurrency users with a new malware designed for macOS by getting victims on Slack or Discord groups to infect themselves with a malicious script.

Posing as group administrators on cryptocurrency forums and discussion boards, the malicious actors are sharing a script, and encouraging users to copy and paste it into a Terminal window on their Macs, disguised as helpful advice.

The command, once entered, downloads a 34-megabyte payload from a remote server and grants backdoor access into the infected machine, according to Remco Verhoef from SANS, who first discovered the threat.

Later dubbed OSX.Dummy by Mac malware expert Patrick Wardle for a host of reasons, the infection is able to bypass Gatekeeper, an additional layer of security on macOS X, if enabled directly through terminal commands, despite the fact it is unsigned code - meaning it should, in theory, be immediately detected.

Among Wardle's observations, he noted "the infection method is dumb, the massive size of the binary is dumb, the persistence mechanism is lame (and thus also dumb)" and "the capabilities are rather limited (and thus rather dumb)".

The large binary attempts to encrypt its communication with the original server, and, once executed, uses sudo to elevate its rights on the infected machine. From there, it seems to do no more than create a shell script file and a launch daemon to keep it running.

Despite the malware being not particularly exceptional, according to Thomas Reed, Malwarebytes' director of Mac and mobile, the method of distributing is itself interesting, given how often people on forums have been giving instructions that involve running line-by-line terminal commands for years.

"There have been other cases in the past of scripts being posted that were actually malicious in nature," he wrote on the cyber security company's official blog.

"The most well known of these was an infamous trick where users were told to run the following command to cure whatever problem they were having: sudo rm -rf /. Unfortunately for users who actually followed directions like these, this command actually erases the hard drive.

"Thus, there's precedent for being suspicious of shell scripts posted online, yet even so, many people will still run highly suspicious scripts without a care. Readers are encouraged to educate users about the dangers of this behaviour at every opportunity."

The executable file also asks for a password when first run, which may be seen as normal sudo behaviour, but is actually the malware stealing the user's password, which it subsequently stores on small data files named 'dumpdummy' on the infected Macs.

This, according to Reed, poses a "serious security threat", and given the file itself is not malicious likely won't be detected by most, if any, antivirus software. Removing the infection therefore won't necessarily remove the 'dumpdummy' files.

The analysts involved have not yet been able to determine the attackers' aims, but, given the fact the malware grants an attacker the ability to execute command-line code as the root user and that cryptocurrency users are being targeted, they are likely to be motivated by cryptocurrency theft.

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Recommended

The ultimate guide to landing a cyber security career
Careers & training

The ultimate guide to landing a cyber security career

30 Sep 2020
8 of the most secure web browsers
web browser

8 of the most secure web browsers

25 Sep 2020
Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Nokia will replace Huawei as BT's largest 5G equipment provider
5G

Nokia will replace Huawei as BT's largest 5G equipment provider

29 Sep 2020