3、研究人员发现今年首个Mac恶意软件Quimitchin
标题:Malwarebytes Discovers 'First Mac Malware of 2017
作者信息:Wednesday January 18, 2017 07:45PM By BeauHD
//BEGIN
Security researchers have a uncovered a Mac OS based espionage malware they have named "Quimitchin." The malware is what they consider to be "the first Mac malware of 2017," which appears to be a classic espionage tool. While it has some old code and appears to have existed undetected for some time, it works. It was discovered when an IT admin noticed unusual traffic coming from a particular Mac, and has been seen infecting Macs at biomedical facilities.
Mac电脑的首个恶意代码最近被发现,起因是IT管理员通过监控发现了来自该Mac电脑的异常流量。而其实这是由一个传统的间谍工具软件导致的。其被命名为Quimitchin。从分析来看,似乎已经感染一段时间了。
//END
From SecurityWeek.com: "Quimitchin comprises just two files: a .plist file that simply keeps the .client running at all times, and the .client file containing
the payload. The latter is a 'minified and obfuscated' perl script that is more novel in design. It combines three components, Thomas Reed, director of Mac offerings at Malwarebytes and author of the blog post told SecurityWeek: 'a Mac binary, another perl script and a Java class tacked on at the end in the __DATA__ section of the main perl script. The script extracts these, writes them to /tmp/ and executes them.' Its primary purpose seems to be screen captures and webcam access, making it a classic espionage tool. Somewhat surprisingly the code uses antique system calls. 'These are some truly ancient functions, as far as the tech world is concerned, dating back to pre-OS X days,' he wrote in the blog post. 'In addition, the binary also includes the open source libjpeg code, which was last updated in 1998.' The script also contains Linux shell commands. Running the malware on a Linux machine, Malwarebytes 'found that -- with the exception of the Mach-O binary -- everything ran just fine.' It is possible that there is a specific Linux variant of the malware in existence -- but the researchers have not been able to find one. It did find two Windows executable files, courtesy of VirusTotal, that communicated with the same CC server. One of them even used the same libjpeg library, which hasn't been updated since 1998, as that used by Quimitchin."
而这个Quimitchin的恶意代码由2个文件组成:第一个是.plist;第二个是.client,前者会让后者一直运行,而后者其实就是恶意代码,采用Perl的脚本语言编写,它由三个部件组成:二进制文件、另外一个Perl脚本以及Java类。脚本会解压缩,并将他们写入到临时目录tmp下。其主要功能看样子像是截屏、或者录屏,这些都是经典的间谍软件的必要元素。
点评:Windows、Linux,现在轮到Mac了? |