![macos malware runonly applescripts to detection macos malware runonly applescripts to detection](https://www.hackread.com/wp-content/uploads/2020/09/malware-on-bigSur-macos.jpg)
Show Notes: iCloud Time Machine for Mac & new AirPort routers pop out of rumor mill - but hurdles abound Why Apple Is Missing the Boat on Home Wi-fi Gurman: Apple Preparing to Debut Enhanced Lock Screen, Windowing in iPadOS, Redesigned Mac Apps, and More at WWDC 'realityOS' Trademark Filing Hints at Possible WWDC Announcement Hackers steal WhatsApp accounts using call forwarding trick Messages Sent Through Zoom Can Expose People to Cyber-Attack Apple earned the third-most gaming revenue in 2021, outpacing Microsoft & Nintendo Apple injects ads into “ad-free” Apple Music playlists Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021. In July 2020, the security firm ESET reported a group of spoofed cryptocurrency trading apps was targeting devices running macOS to install malware called Gmera (see: Malicious Cryptocurrency Trading Apps Target MacOS Users).As we await next week's Worldwide Developer Conference, we discuss what Apple may present. The malware used an updated backdoor and multistage payloads as well as anti-detection techniques to help bypass security tools (see: Fresh MacOS Backdoor Variant Linked to Vietnamese Hackers).
![macos malware runonly applescripts to detection macos malware runonly applescripts to detection](https://www.trendmicro.com/content/dam/trendmicro/global/en/research/20/g/updates-on-quickly-evolving-thiefquest-macos-malware/fig%2034-ThiefQuest.png)
In December, researchers at Trend Micro uncovered a macOS backdoor variant linked to an advanced persistent threat group operating from Vietnam. Other security researchers have reported attacks targeting macOS devices to plant cryptominers or other types of malware.Įarlier this month, researchers at Intezer Labs uncovered a campaign using a remote access Trojan dubbed ElectroRAT that had been stealing cryptocurrency from digital wallets on Windows, Linux and macOS platforms (see: ElectroRAT Malware Targets Cryptocurrency Wallets). The researchers say that once the malware has compromised a macOS device, it will seek to kill several processes, including Activity Monitor, which prevents the user from inspecting resource usage.
![macos malware runonly applescripts to detection macos malware runonly applescripts to detection](https://www.2-spyware.com/news/wp-content/uploads/news/mac-malware-uses-executable-file-to-infect-users-wth-data-stealer-adware_en.jpg)
To decompile the malicious malware scripts, Sentinel Labs researchers had to use a relatively lesser-known AppleScript-disassembler project and another custom tool developed by the security firm. OSAMiner uses run-only AppleScripts to make reverse-engineering of its code difficult, the researchers say. "Recent versions of macOS.OSAMiner add greater complexity by embedding one run-only AppleScript inside another, further complicating the already difficult process of analysis." Security Evasion "In late 2020, we discovered that the malware authors, presumably building on their earlier success in evading full analysis, had continued to develop and evolve their techniques," says Phil Stokes, a threat researcher at Sentinel Labs. OSAMiner's operators released the latest version of the cryptominer in 2020, but researchers only recently discovered the enhancements, according to the researchers' report.
![macos malware runonly applescripts to detection macos malware runonly applescripts to detection](https://easyquickremoval.com/wp-content/uploads/2018/06/eqrshf-11-768x555.png)
The malware now uses multiple versions of AppleScript - a scripting language used in macOS devices - to support obfuscation. OSAMiner, which has been active since 2015, has been distributed through hacked video games, such as League of Legends, as well as compromised versions of software packages, including Microsoft Office for macOS, Sentinel Labs says. The latest iteration uses new techniques to help prevent detection by security tools, the researchers report. See Also: OnDemand | Fireside Chat | Zero Tolerance: Controlling The Landscape Where You'll Meet Your Adversaries Sentinel Labs researchers have identified an updated version of the cryptominer OSAMiner that targets the macOS operating system to mine for monero.