Calendar Meeting Links Used to Spread Mac Malware

Discussion in 'all things Mac' started by 1PW, Mar 3, 2024.

  1. 1PW

    1PW Registered Member

     
  2. Rasheed187

    Rasheed187 Registered Member

    Wow, seems like a quite nifty attack that might fool a lot of people. And XProtect really isn't good enough in my view, way too easy to bypass since it relies mostly on signatures.

    See also this article:

    https://www.malwarebytes.com/blog/news/2024/03/malicious-meeting-invite-fix-targets-mac-users
     
  3. 1PW

    1PW Registered Member

    Hello @Rasheed187

    Until much more clarity is brought to this attack's possible macOS defenses, I have added the corrected IP address, of the apparent command & control server (C²), to my third-party firewall app. That C² IP address is beginning to be flagged in VirusTotal's detections.

    Of course, the above fails to address possible weaknesses of macOS/Calendar. At the very least, an appropriate CVE needs to be initiated, if not already in the works.

    Hopefully, we may see a fine-grain analysis by others soon.

    HTH
     
    Last edited: Mar 4, 2024
  4. Rasheed187

    Rasheed187 Registered Member

    A third party firewall should block this trojan anyway, unless it makes use of code injection, but I don't believe malware does this on macOS, because macOS has better protection against this out of the box, from what I understood. But it's not impossible, see links. Bottom line is, macOS need better behavior blocking tools.

    https://www.darkreading.com/endpoint-security/researchers-explore-remote-code-injection-in-macos
    https://www.deepinstinct.com/blog/remote-code-injections-in-mac-os (can't download the report anymore)
     
  5. 1PW

    1PW Registered Member

    Hello @Rasheed187

    I agree. When discovered and published, I drop IPs and/or URLs on my 3rd party firewall. I also like that the new YARA rules are frequently used by Apple's macOS teams. However, I'm underwhelmed with the infrequent use of the new Bastion rules. Moreover, I wish XProtect/XProtect Remediator additions were released as soon as they are approved instead of some arbitrary weekly schedule.

    Since Apple's macOS Sonoma 14.4 is now at its release control phase, maybe we will soon see some significant security improvements.

    Cheers
     
  6. Rasheed187

    Rasheed187 Registered Member

    Thanks for the second link, that's a very interesting article from SentinelOne. :thumb:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice