Researchers on Wednesday confirmed that an OS X variant of a recently discovered family of cross-platform backdoors exists.
Stefan Ortloff, a researcher with Kaspersky Lab’s Global Research and Analysis Team, identified the family of backdoors called Mokes in January, but it wasn’t until Tuesday that an OS X variant was discovered. Ortloff wrote a technical breakdown of the backdoors, including the [Linux and Windows iterations](<https://securelist.com/blog/research/73503/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/>) and [the new OS X variant](<https://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered/>), in a series of posts on Securelist.
Similar to the Linux and Windows variants, the OS X backdoor specializes in capturing audio and taking screenshots every 30 seconds from a victim’s machine.
The variant, Backdoor.OSX.Mokes.a, can also monitor removable storage—such as whether a USB thumb drive is connected to the machine, and can also monitor the file system for Office documents such as .docx, .doc, .xlsx, and .xls files.
The backdoor can also execute arbitrary commands on the system, something the attacker can oversee and fine-tune, along with what’s monitored, via filters in the backdoor’s command and control server.
Ortloff notes the OS X sample he analyzed was already unpacked but that he believes it’s usually packed, as the Linux variant he saw in January. After it’s executed, the backdoor copies itself to a handful of locations, including any caches that belong to Skype, Dropbox, Google, and Firefox. The technique is similar to the Linux counterpart, which after execution copied itself to locations belonging to Dropbox and Firefox.
After it establishes a connection with its command and control server – via HTTP on TCP port 80– the backdoor communicates – via TCP port 443 – using AES-256 encryption.
Ortloff expected to see Mac OS X samples back in January, after noticing the Windows and Linux variants; they just never surfaced.
It was only after Ortloff was able to obtain the Linux variant, Backdoor.Linux.Mokes.a that he was able to extract its binary and discover the Windows variant, Backdoor.Win32.Mokes.imv.
Ortloff doesn’t get into the OS X backdoor’s infection vector, or how widespread its footprint may be. Nonetheless, based on his description, the Mokes OS X backdoor is a sophisticated piece of malware.
A request for comment on the backdoor to Apple was not immediately returned on Wednesday.
While not unheard of– attackers have been poking holes in OS X and more so, iOS as of late – OS X backdoors have been few and far between as of late.
In 2012 researchers with Kaspersky Lab’s GReAT team intercepted an APT campaign that used a Mac OS X backdoor to target Uyghur activists. That backdoor was circulated via targeted emails which contained a .zip file, .jpeg file, and OS X application. Once executed, the application connected to its C+C and let the attacker execute arbitrary commands and access the infected machine’s files.
On the whole, Mac malware has emerged as a palpable threat over the last few years. [WireLurker](<https://threatpost.com/wirelurker-mac-os-x-malware-shut-down/109204/>), discovered by researchers at Palo Alto Networks, was capable of stealing system information and data stored on mobile devices running iOS. Two other threats unearthed by the company, [XcodeGhost](<https://threatpost.com/xcodeghost-ios-malware-contained/114745/>), appended malicious code to a number of popular iOS apps, and [YiSpecter](<https://threatpost.com/yispecter-ios-malware-abuses-apple-enterprise-certs-to-push-adware/114917/>) abused Apple Enterprise Program certificates to push adware.
{"id": "THREATPOST:078A58572856754DC022CA17CD4D138C", "vendorId": null, "type": "threatpost", "bulletinFamily": "info", "title": "Data Stealing Mac OS X Backdoor Uncovered", "description": "Researchers on Wednesday confirmed that an OS X variant of a recently discovered family of cross-platform backdoors exists.\n\nStefan Ortloff, a researcher with Kaspersky Lab\u2019s Global Research and Analysis Team, identified the family of backdoors called Mokes in January, but it wasn\u2019t until Tuesday that an OS X variant was discovered. Ortloff wrote a technical breakdown of the backdoors, including the [Linux and Windows iterations](<https://securelist.com/blog/research/73503/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/>) and [the new OS X variant](<https://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered/>), in a series of posts on Securelist.\n\nSimilar to the Linux and Windows variants, the OS X backdoor specializes in capturing audio and taking screenshots every 30 seconds from a victim\u2019s machine.\n\nThe variant, Backdoor.OSX.Mokes.a, can also monitor removable storage\u2014such as whether a USB thumb drive is connected to the machine, and can also monitor the file system for Office documents such as .docx, .doc, .xlsx, and .xls files.\n\nThe backdoor can also execute arbitrary commands on the system, something the attacker can oversee and fine-tune, along with what\u2019s monitored, via filters in the backdoor\u2019s command and control server.\n\nOrtloff notes the OS X sample he analyzed was already unpacked but that he believes it\u2019s usually packed, as the Linux variant he saw in January. After it\u2019s executed, the backdoor copies itself to a handful of locations, including any caches that belong to Skype, Dropbox, Google, and Firefox. The technique is similar to the Linux counterpart, which after execution copied itself to locations belonging to Dropbox and Firefox.\n\nAfter it establishes a connection with its command and control server \u2013 via HTTP on TCP port 80\u2013 the backdoor communicates \u2013 via TCP port 443 \u2013 using AES-256 encryption.\n\nOrtloff expected to see Mac OS X samples back in January, after noticing the Windows and Linux variants; they just never surfaced.\n\nIt was only after Ortloff was able to obtain the Linux variant, Backdoor.Linux.Mokes.a that he was able to extract its binary and discover the Windows variant, Backdoor.Win32.Mokes.imv.\n\nOrtloff doesn\u2019t get into the OS X backdoor\u2019s infection vector, or how widespread its footprint may be. Nonetheless, based on his description, the Mokes OS X backdoor is a sophisticated piece of malware.\n\nA request for comment on the backdoor to Apple was not immediately returned on Wednesday.\n\nWhile not unheard of\u2013 attackers have been poking holes in OS X and more so, iOS as of late \u2013 OS X backdoors have been few and far between as of late.\n\nIn 2012 researchers with Kaspersky Lab\u2019s GReAT team intercepted an APT campaign that used a Mac OS X backdoor to target Uyghur activists. That backdoor was circulated via targeted emails which contained a .zip file, .jpeg file, and OS X application. Once executed, the application connected to its C+C and let the attacker execute arbitrary commands and access the infected machine\u2019s files.\n\nOn the whole, Mac malware has emerged as a palpable threat over the last few years. [WireLurker](<https://threatpost.com/wirelurker-mac-os-x-malware-shut-down/109204/>), discovered by researchers at Palo Alto Networks, was capable of stealing system information and data stored on mobile devices running iOS. Two other threats unearthed by the company, [XcodeGhost](<https://threatpost.com/xcodeghost-ios-malware-contained/114745/>), appended malicious code to a number of popular iOS apps, and [YiSpecter](<https://threatpost.com/yispecter-ios-malware-abuses-apple-enterprise-certs-to-push-adware/114917/>) abused Apple Enterprise Program certificates to push adware.\n", "published": "2016-09-07T12:55:15", "modified": "2016-09-07T16:55:15", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://threatpost.com/data-stealing-mac-os-x-backdoor-uncovered/120397/", "reporter": "Chris Brook", "references": ["https://securelist.com/blog/research/73503/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/", "https://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered/", "https://threatpost.com/wirelurker-mac-os-x-malware-shut-down/109204/", "https://threatpost.com/xcodeghost-ios-malware-contained/114745/", "https://threatpost.com/yispecter-ios-malware-abuses-apple-enterprise-certs-to-push-adware/114917/"], "cvelist": [], "immutableFields": [], "lastseen": "2018-10-06T22:54:47", "viewCount": 11, "enchantments": {"score": {"value": 0.8, "vector": "NONE"}, "dependencies": {"references": []}, "backreferences": {"references": [{"type": "threatpost", "idList": ["THREATPOST:4F38C88AD989EC56168F3AE8CB1688C2", "THREATPOST:E94F9C6F4B739E58C6AA953FB5E95BA0"]}]}, "exploitation": null, "vulnersScore": 0.8}, "_state": {"dependencies": 1678917980, "score": 1678916296, "epss": 1678938645}, "_internal": {"score_hash": "130ea3aa04161bc2120e3b3765e72e12"}}