Menu
Mac malware, possibly made in Iran, targets US defense industry

Mac malware, possibly made in Iran, targets US defense industry

The malware has also been found targeting a human rights activist

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian hackers to target the U.S. defense industry.

The malware, called MacDownloader, was found on a website impersonating the U.S. aerospace firm United Technologies, according to a report from Claudio Guarnieri and Collin Anderson, who are researching Iranian cyberespionage threats.

The fake site was previously used in a spear phishing email attack to spread Windows malware and is believed to be maintained by Iranian hackers, the researchers claimed.

Visitors to the site are greeted with a page about free programs and courses for employees of U.S. defense companies Lockheed Martin, Raytheon, and Boeing.

The malware itself can be downloaded from an Adobe Flash installer for a video embedded in the site. The website will provide either Windows or Mac-based malware, depending on the detected operating system.

bait utc Iran Threats

A screenshot of the fake site. 

The MacDownloader malware was designed to profile the victim's computer, and then steal credentials by generating fake system login boxes and harvesting them from Apple's password management system, Keychain.

However, the malware is of shoddy quality and is "potentially a first attempt from an amateur developer," the researchers said.

For instance, once the malware is installed, it'll generate a fake Adobe Flash Player dialog box, only to then announce adware was discovered on the computer that it'll attempt to clean up.

"These dialogues are also rife with basic typos and grammatical errors, indicating that the developer paid little attention to quality control," the researchers said.

In addition, the malware failed to run a script to download additional malicious coding onto the infected Mac.  

But despite the shoddy quality, the malware still managed to evade detection on VirusTotal, which aggregates antivirus scanning engines.

The researchers found other circumstantial evidence that the malware is linked to Iran. An exposed server that the MacDownloader agent uploaded to showed wireless networks called "Jok3r" and "mb_1986." Both of these names have ties to previous Iranian hacking groups, including one known as Flying Kitten, which is suspected of targeting U.S. defense contractors and political dissidents.

In an email, Anderson said a colleague of theirs also observed MacDownloader targeting a human rights activist.

The danger is that many human rights supporters, especially in Iran, are dependent on Apple devices, the researchers said. "While this [malware] is neither sophisticated nor full-featured, its sudden appearance is concerning given the popularity of Apple computers," they wrote in their report.

Mac malware is fairly rare, according to security researchers. That's because hackers tend to attack Windows-based devices, because of their popularity.

However, Mac-based malware is still popping up here and there. Last month, researchers found another kind designed to spy on biomedical research centers. A separate Mac-based Trojan was found months earlier, targeting the aerospace industry. 


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments