- SIGNS OF RANSOMWARE ON MAC INSTALL
- SIGNS OF RANSOMWARE ON MAC PATCH
- SIGNS OF RANSOMWARE ON MAC SOFTWARE
- SIGNS OF RANSOMWARE ON MAC CODE
Both variants installed copies of the patch file at the following locations: /Library/AppQuest/ Once the infection was triggered by the installer, the malware began spreading itself quite liberally around the hard drive.
SIGNS OF RANSOMWARE ON MAC CODE
This one did not include code to launch a legitimate installer, and simply dropped the Mixed In Key app into the Applications folder directly. Mv /Applications/Utils/patch /Library/mixednkey/toolroomd The Mixed In Key installer turned out to be quite similar, though with slightly different file names and postinstall script. There are undoubtedly other installers floating around as well that have not been seen.
SIGNS OF RANSOMWARE ON MAC SOFTWARE
While waiting for the malware to do something-anything!-further investigation turned up an additional malicious installer, for some DJ software called Mixed In Key 8, as well as hints that a malicious Ableton Live installer also exists (although such an installer has not yet been found). Further, the malware didn’t actually start encrypting anything, despite the fact that I let it run for a while with some decoy documents in position as willing victims. The malware got installed, but the attempt to run the Little Snitch installer got hung up indefinitely, until I eventually forced it to quit.
Finally, it launches the Little Snitch installer. It then removes itself from the /Users/Shared/ folder and launches the new copy. As there is a legitimate process that is part of macOS named Crash Reporter, this name will blend in reasonably well if seen in Activity Monitor. The script moves the patch file into a location that appears to be related to LittleSnitch and renames it to CrashReporter. Open /Users/Shared/LittleSnitchInstaller.app & Mv /Users/Shared/Utils/patch /Library/LittleSnitchd/CrashReporterĬhmod +x /Library/LittleSnitchd/CrashReporter It is normal for this type of installer to contain preinstall and/or postinstall scripts, for preparation and cleanup, but in this case the script was used to load the malware and then launch the legitimate Little Snitch installer. The installer also contained a postinstall script-a shell script that is executed after the installation process is completed.
SIGNS OF RANSOMWARE ON MAC INSTALL
Malicious Little Snitch installerĮxamining this installer revealed that it would install what turned out to be the legitimate Little Snitch installer and uninstaller apps, as well as an executable file named “patch”, into the /Users/Shared/ directory. Worse, the installer package was pointlessly distributed inside a disk image file. However, this installer was a simple Apple installer package with a generic icon. To start, the legitimate Little Snitch installer is attractively and professionally packaged, with a well-made custom installer that is properly code signed. RUTracker post showing magnet link to malicious installer InstallationĪnalysis of this installer showed that there was definitely something strange going on. In fact, we discovered that not only was it malware, but a new Mac ransomware variant spreading via piracy. A post offered a torrent download for Little Snitch, and was soon followed by a number of comments that the download included malware. The new name, ThiefQuest, is also more fitting for our updated understanding of the malware.Ī Twitter user going by the handle messaged me yesterday after learning of an apparently malicious Little Snitch installer available for download on a Russian forum dedicated to sharing torrent links.
Editor’s note: The original name for the malware, EvilQuest, has been changed due to a legitimate game of the same name from 2012.