Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Desktops (Apple)

Sophisticated New Malware Found on 30,000 Macs Stumps Security Pros (arstechnica.com) 66

Long-time Slashdot reader b0s0z0ku quotes Ars Technica: A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, which are still trying to understand precisely what it does and what purpose its self-destruct capability serves.

Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So far, however, researchers have yet to observe delivery of any payload on any of the infected 30,000 machines, leaving the malware's ultimate goal unknown. The lack of a final payload suggests that the malware may spring into action once an unknown condition is met.

Also curious, the malware comes with a mechanism to completely remove itself, a capability that's typically reserved for high-stealth operations. So far, though, there are no signs the self-destruct feature has been used, raising the question why the mechanism exists. Besides those questions, the malware is notable for a version that runs natively on the M1 chip that Apple introduced in November, making it only the second known piece of macOS malware to do so...

The malware has been found in 153 countries with detections concentrated in the US, UK, Canada, France, and Germany.

Red Canary, the security firm that discovered the malware, has named it "Silver Sparrow." Long-time Slashdot reader Nihilist_CE writes: First detected in August of 2020, the Silver Sparrow malware is interesting in several unsettling ways. It uses the macOS Installer Javascript API to launch a bash process to gain a foothold into the user's system, a hitherto-unobserved method for bypassing malware detection. This bash shell is then used to invoke macOS's built-in PlistBuddy tool to create a LaunchAgent which executes a bash script every hour. This is the command and control process, which downloads a JSON file containing (potentially) new instructions.

Besides the novel installation method, Silver Sparrow is also mysterious in its payload: a single, tiny binary that does nothing but open a window reading "Hello, World!" (in v1, which targets Intel Macs) or "You did it!" (in v2, which is an M1-compatible fat binary). These "bystander binaries" are never executed and appear to be proofs-of-concept or placeholders for future functionality.

This discussion has been archived. No new comments can be posted.

Sophisticated New Malware Found on 30,000 Macs Stumps Security Pros

Comments Filter:
  • by Alain Williams ( 2972 ) <addw@phcomp.co.uk> on Sunday February 21, 2021 @08:40AM (#61085934) Homepage

    The article did not say so. Apple seems to know who did it as "Apple has revoked the developer certificate for both bystander binary files." - will we be told who they are (once checked out) ?

    • by bill_mcgonigle ( 4333 ) * on Sunday February 21, 2021 @08:53AM (#61085956) Homepage Journal

      It's probably easy to get a developer account anonymously, but just wait until Apple has its security chips sign apps and refuses to run apps not signed by the chip. Then they'll trace supply chain logistics on a machine's serial number.

      "To combat malware," of course, but then subsequently whomever the Parler app developer is finds his machine unable to compile runnable code anymore.

      "Find out why 2024 will be like 1984".

      • This has the makings of a good Babylon Bee article. Increase the humour, reduce the fantasy, and submit your draft. The trick is to be over the top while skirting Poeâ(TM)s law.

      • Re: (Score:2, Flamebait)

        by MacMann ( 7518492 )

        but just wait until Apple has its security chips sign apps and refuses to run apps not signed by the chip.

        Right. Because Apple is willing to destroy their image of their computers being the preferred platform for creating content, which includes software, because someone found a virus.

        Maybe instead we could see Apple create their own anti-malware defenses like Microsoft has done with Windows Defender.

        Or maybe not. Because if Apple is making anti-malware scanning software for their computers then that would be an implied admission that Apple computers lack inherent security from their operating system policies

    • I'd like to check my logs for it.
  • Sigh (Score:5, Interesting)

    by ledow ( 319597 ) on Sunday February 21, 2021 @08:42AM (#61085936) Homepage

    You guys never played Plague Inc?

    You wait until you're in any many places as possible and nobody has noticed, before you start doing any action which might give away your presence.

    Honestly, there's nothing different about that - nor to having an "disinfect" action.

    The only thing "new" here is that it has a target for the M1 arch, and even that - as the article points out - isn't unique.

    This is hyperbole, it's just malware, this is exactly how malware works, and how malware is operated if the authors have half a brain.

    • Re:Sigh (Score:5, Interesting)

      by Synonymous Cowered ( 6159202 ) on Sunday February 21, 2021 @09:02AM (#61085970)

      I had the same thought...not unusual for it to appear to not do anything, as you wait until everything is in place before activating. Likewise, regarding the statement that there is no sign the self destruct has activated, you wouldn't expect it to self destruct before it has been activated.

      Then I put on my tin foil hat and thought perhaps the self destruct has been activated. Maybe that's why they found it on so few macs. It deployed and activated, completed its mission, and then was deactivated. The 30k that are left for some reason either didn't operate properly, or weren't turned on for the period where the control server was telling them to deactivate, or failed the uninstall somehow.

      However, I don't know what sort of logging macs do in this regard (either software installations or apps launching other app). Maybe it's possible for them to tell that no software was activated by the software.

      • Perhaps the operator is watching the request domains streaming through the s3 bucket access logs. Waiting for something interesting like "Whitehouse.gov" or "Kremlin.ru". Then the JSON payload changes to some command that says, "retrieve all documents and upload to s3 bucket."
    • by _merlin ( 160982 )

      This looks a lot like a proof-of-concept malware system built by a kid for lulz. Way back in the day, I wrote a trivial virus for Mac System 7.1 (you know, when an '040 was a good processor), just to see if I could do it. Fortunately it never got into the wild. This looks like the same level of effort.

      • Re: Sigh (Score:4, Insightful)

        by BAReFO0t ( 6240524 ) on Sunday February 21, 2021 @09:57AM (#61086078)

        I think everyone did that at least once in their programming career, usually when young. First, it is exciting and against the rules, second, it teaches you and shows that you know a lot about a system.

        Also, you gain the power to fight back. Which is good for self-confidence. And then you succeed at other things and you don't even need it anymore, which is a constant reminder of your own confidence.

        Kinda a programmer rite of passage.

      • From installer do blash blah - been done before Self destruct AFTER popping a privileged task on the stack to reinstall later. This way you see an AV package starting up, pop the script or command on the stack and self destruct - so the scanner sees nothing. Best to read the startup from the log - just in case the doctored process is detected and raises some flags. Logs and registries are great places to hide code in plain sight. Some APT's are getting there.
    • You guys never played Plague Inc?

      You wait until you're in any many places as possible and nobody has noticed, before you start doing any action which might give away your presence.

      Yep. It doesn't take a genius to figure out what the "unknown condition" is.

      I'd say it's "when there's more than 30,000 Macs infected".

      (or some other number)

      Luckily no Mac is running any anti-malware program that can kick it off the disk.

    • You guys never played Plague Inc?

      Did you not visit Slashdot this past year? Based on how people were talking about COVID it's clear they haven't even done something this basic.

  • Nonsense! (Score:5, Insightful)

    by gnasher719 ( 869701 ) on Sunday February 21, 2021 @09:31AM (#61086016)
    The malware is not "sophisticated". There is an installer that you need to download and install the malware yourself. So you only get it through utter user stupidity. And experts are not "stumped" by the malware being extraordinarily clever, but by the fact that it doesn't actually do anything.

    Guys, it isn't even malware! The installer does weird things that are usually associated with malware, but the software actually does nothing than showing a screen with a message. The "malware" was actually signed with a genuine developer certificate, so Apple would know who did it, and the developer certificates have been revoked which most likely means their account is closed.
    • Re:Nonsense! (Score:5, Insightful)

      by DontBeAMoran ( 4843879 ) on Sunday February 21, 2021 @09:59AM (#61086082)

      The real problem here is that we invented the word "malware" to replace "trojans", "viruses" and other annoying software because people are too stupid to differentiate between a self-installing, self-propagating virus and a trojan that needs to be installed by the user itself.

      • by dfghjk ( 711126 )

        Trojans are malware. "DontBeAMoran"

        The pedantic complaint you are looking for is "a trojan is not a virus". Nice try at looking intelligent.

        • His response in context was correct I think. The post he was responding to took issue that the malware wasn't sophisticated because it has to be installed by the user. Which itself is valid, since we often measure sophisitication on its effectiveness in how easily it can spread undetected.

          But the use of the word malware is often affributed to crap on a machine that is both damaging and you don't know about it. So I personally think it could be forgiven by assuming the use of the word malware meant someth

          • by dfghjk ( 711126 )

            OP: "Guys, it isn't even malware!"
            Response: "The real problem here is that we invented the word "malware" to replace..."

            Trojans ARE malware, and the "real problem" isn't that the term "malware" was invented. It's irrelevant to the entire conversation what "category" of malware it is. So what context here makes his response correct?

            "The post he was responding to took issue that the malware wasn't sophisticated because it has to be installed by the user."

            Yes, a typical attack to denigrate someone else's com

            • I don't know how you understood it that way, but I never said that trojans aren't malware.

              Let me explain it again: I said that malware is too broad of a description and that the word is a bit useless in describing the scope of the problem. Are computers getting infected by simply visiting a website, or does a stupid user need to enter his password to install something himself?

        • by dfm3 ( 830843 )
          Yes, that's exactly what they meant... that everyone these days just refers to trojans, viruses, worms, etc collectively as "malware".

          There's a huge difference between "trojan that 30,000 naive users accidentally installed because they wanted a browser toolbar with a purple talking gorilla in it" and "worm that infected 30,000 computers remotely through zero user intervention". The problem is that the average user doesn't care about the distinction, even though the difference is significant.
      • because people are too stupid to differentiate between a self-installing, self-propagating virus and a trojan that needs to be installed by the user itself.

        Ultimately for a user it's a distinction without a difference when it comes to their security. We've proven quite well time and time again that users are either good at preventing infection from viruses and trojans, or are good at neither.

      • I've seen malware used to refer to cookies.

        • And everything we don't like is "evil". Welcome to the watering down of the English language. Hopefully nothing will come of it, just a lessening of the outrage.

          • And everything we want to remove is being "killed" or "deleted".

            Slashdot is often guilty of that with their stupid "senators want to kill this bill" for example. You can't kill a bill, it's not a living thing.

            Unless of course we're talking about "Kill Bill" which is a kick-ass two-parts movie.

    • 1. Every malware isn't malware ... until it is. That is what the vector/payload separation is for.

      2. Yes, it's script kiddie level. Nice if you are... say, 15. Practical, as it does the job, if you are 19. But if you're a grown man, and your "malware" requires the target to download and run the thing himself, then it keeping itself in the system really isn't making it pathetic anymore. :)

    • Re:Nonsense! (Score:4, Insightful)

      by raburton ( 1281780 ) on Sunday February 21, 2021 @11:11AM (#61086196) Homepage

      The malware is not "sophisticated". There is an installer that you need to download and install the malware yourself. So you only get it through utter user stupidity.

      From the article: "It remains unclear precisely how or where the malware is being distributed or how it gets installed."

      If they managed to get 30,000+ people to install it, that's quiet interesting, especially as they say they don't know how that's been done. The level of sophistication (although it seems like a perfectly valid starting point for something much more) seems out of keeping with the number of installs or using fancy zero day exploits for a mass infection campaign. I suspect it was probably bundled with something, but do mac users install as many random, dubious apps on desktops as they might on their phones? Given the hello world samples included it might just be a little developers toy/ debugging aid that accidentally got shipped with a legit product.

      • Itâ(TM)s easy to get 30,000 people to install something. Get an ad that offers something they want for free. Free porn, free bitcoins, VLC or Flash player, better/free version of Adobe software whatever.

        • Itâ(TM)s easy to get 30,000 people to install something. Get an ad that offers something they want for free. Free porn, free bitcoins, VLC or Flash player, better/free version of Adobe software whatever.

          How big of an ad campaign would you need to get not just 30,000 clicks but 30,000 downloads and installs? Sounds expensive for something that, 6 months later, doesn't appear to have been used. If a week later they were all mining bitcoin I could understand it.

        • Free Slashdot account, get'em before they're all gone!

    • Did you even read the summary? The malware checks every hour with a server to see if there are new instructions, and those instructions could be most anything. Until the balloon goes up, this scout tries to keep a low profile.

  • by fygment ( 444210 ) on Sunday February 21, 2021 @09:39AM (#61086034)

    These 30,000 malfunctioned in that they did not execute the 'self-destruct' issued a while ago. Fortunately the other 2 million did fine.

  • by Impy the Impiuos Imp ( 442658 ) on Sunday February 21, 2021 @10:33AM (#61086140) Journal

    an M1-compatible fat binary

    God, the distal end of the LGBTQ acronym is changing so fast I can hardly keep up.

    • by Anonymous Coward

      Goddammit I just had an appendectomy, don't make me laugh!

    • by Whibla ( 210729 )

      Literally crying...

      Thanks for that!

  • It's always good to run a software firewall on your machine. I use Little snitch on the Mac to block all connections I don't recognize.
  • is someone gonna let us know how we can ensure we're not infected?

  • I know exactly what this malware is, and I've seen a lot like it. It's only out there to be used against me, either directly or indirectly. The mystery activation clause is "I or someone I know buys one of these stupid things." And after it is activated, they'll deny all knowledge of it, collect it, study it, alter it, and redeploy it for themselves. Our government is corrupt.

  • They forgot the password for the command and control center evil agent's password.
  • I read somewhere that Macs were supposed to be secure. And the MacOS installer has a JavaScript API? Sheesh, I;m sticking to Gentoo.

  • Yeah, every year we have new viruses. We should be careful
  • It uses the macOS Installer Javascript API

    SEE GUYS, SEE! This is PROOF that JavaScript is a terrible piece of evil THAT CAN ONLY be used for EVIL THINGS! ZOMG JavaScript doesn't even HAVE TYPE SAFETY! And Node.JS relies on a package manager where you JUST DON"T KNOW WHAT EVIL IS BEING INSTALLED ON YOUR MACHINE!

    Go away, JavaScript, and let me compile my program and its three dependencies in assembly language by hand.

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...