Menu
Mac malware, possibly made in Iran, targets US defense industry

Mac malware, possibly made in Iran, targets US defense industry

The malware has also been found targeting a human rights activist

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian hackers to target the U.S. defense industry.

The malware, called MacDownloader, was found on a website impersonating the U.S. aerospace firm United Technologies, according to a report from Claudio Guarnieri and Collin Anderson, who are researching Iranian cyberespionage threats.

The fake site was previously used in a spear phishing email attack to spread Windows malware and is believed to be maintained by Iranian hackers, the researchers claimed.

Visitors to the site are greeted with a page about free programs and courses for employees of U.S. defense companies Lockheed Martin, Raytheon, and Boeing.

The malware itself can be downloaded from an Adobe Flash installer for a video embedded in the site. The website will provide either Windows or Mac-based malware, depending on the detected operating system.

bait utc Iran Threats

A screenshot of the fake site. 

The MacDownloader malware was designed to profile the victim's computer, and then steal credentials by generating fake system login boxes and harvesting them from Apple's password management system, Keychain.

However, the malware is of shoddy quality and is "potentially a first attempt from an amateur developer," the researchers said.

For instance, once the malware is installed, it'll generate a fake Adobe Flash Player dialog box, only to then announce adware was discovered on the computer that it'll attempt to clean up.

"These dialogues are also rife with basic typos and grammatical errors, indicating that the developer paid little attention to quality control," the researchers said.

In addition, the malware failed to run a script to download additional malicious coding onto the infected Mac.  

But despite the shoddy quality, the malware still managed to evade detection on VirusTotal, which aggregates antivirus scanning engines.

The researchers found other circumstantial evidence that the malware is linked to Iran. An exposed server that the MacDownloader agent uploaded to showed wireless networks called "Jok3r" and "mb_1986." Both of these names have ties to previous Iranian hacking groups, including one known as Flying Kitten, which is suspected of targeting U.S. defense contractors and political dissidents.

In an email, Anderson said a colleague of theirs also observed MacDownloader targeting a human rights activist.

The danger is that many human rights supporters, especially in Iran, are dependent on Apple devices, the researchers said. "While this [malware] is neither sophisticated nor full-featured, its sudden appearance is concerning given the popularity of Apple computers," they wrote in their report.

Mac malware is fairly rare, according to security researchers. That's because hackers tend to attack Windows-based devices, because of their popularity.

However, Mac-based malware is still popping up here and there. Last month, researchers found another kind designed to spy on biomedical research centers. A separate Mac-based Trojan was found months earlier, targeting the aerospace industry. 


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Events

Why experience is the new battleground for partners

Join us for an exclusive webinar, in association with Hewlett Packard Enterprise and Technology Services Industry Association (TSIA) and learn about the latest industry insights and how technology services continue to evolve to deliver differentiated value, and how partners can be successful in 2021 and beyond.

Featured

Slideshows

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

The leading female front runners of the New Zealand ICT industry joined together for the annual Reseller News Women in ICT Awards event at the Hilton in Auckland, during which hundreds of guests celebrated 13 outstanding individuals who won awards, chosen from more than 50 finalists representing over 30 organisations.

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards
Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

More than 500 channel leaders gathered in Auckland on 21 October at the ​Reseller News Innovation Awards ​2020 to celebrate the achievements of the New Zealand technology industry's top partners, start-ups, vendors, distributors and individuals.

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners
Show Comments