The recent article from Kaspersky highlights the discovery of a new Trojan Proxy malware campaign targeting Mac users through cracked applications distributed via unauthorised websites. This malware was first submitted to VirusTotal on April 28, 2023, and operates by disguising itself within popular copyrighted macOS software found on warez sites—sites offering copyrighted digital content for free or at lower prices.
Once installed, the malware converts infected computers into anonymous traffic-forwarding terminals, enabling cybercriminals to perform various malicious activities like phishing, hacking, and conducting illegal transactions. The malware allows the attackers to build a proxy server network for criminal purposes or monetary gain.
The infected applications pose as legitimate cracked software, using .PKG installers instead of regular disk images. After installation, a script replaces system files with malicious versions and grants them administration permissions. A fake Google configuration file initiates the malware as a system process.
The malware utilises DNS-over-HTTPS (DoH) to connect to the command-and-control (C&C) server and receives commands via WebSockets for various malicious activities. Despite attempts by researchers, the server responded only to a limited command, indicating potential further developments by threat actors.
Kaspersky identified around 35 instances of popular software applications infected with Trojan Proxy, including image editing, data recovery, video editing, and network scanning tools. Notably, similar versions for Android and Windows were also detected, suggesting a wider distribution network for cracked software containing this malware.
This campaign demonstrates the evolution of cyber threats, employing sophisticated techniques like DoH and WebSocket to evade network-based detection mechanisms. Lionel Litty from Menlo Security warns that these techniques allow the malware to avoid detection from solutions that inspect DNS traffic or HTTPS connections inadequately.
Here are the key points:
Discovery of New Trojan Proxy Malware: Kaspersky uncovered a new Trojan Proxy malware campaign targeting Mac devices. Cybercriminals are distributing this malware through cracked applications obtained from unauthorised websites.
Payload Origin and Distribution: The earliest submission of the malware to VirusTotal dates back to April 28, 2023. It is hidden within popular copyrighted macOS software available on warez sites, which offer digital content for free or at significantly reduced prices.
Malware Functionality: Once installed, the malware converts infected computers into anonymous traffic-forwarding terminals. This allows cybercriminals to conduct malicious activities like phishing, hacking, and illegal transactions. It enables the creation of a proxy server network for criminal operations or financial gain.
Installation and Execution: Infected applications appear as legitimate cracked software, using .PKG installers instead of typical disk images. Upon installation, the malware replaces system files with malicious versions, gaining administration permissions. A fake Google configuration file initiates the malware as a system process.
Communication and Command Handling: The malware uses DNS-over-HTTPS (DoH) and WebSockets to connect to a command-and-control (C&C) server. It receives commands for various malicious activities. Researchers' attempts to communicate with the server revealed limited responses, indicating potential ongoing development by threat actors.
Impacted Software and Platforms: Kaspersky identified about 35 instances of popular software applications infected with Trojan Proxy. These include image editing, data recovery, video editing, and network scanning tools. Similar malware versions for Android and Windows were also detected, suggesting a broader distribution network.
Sophisticated Evasion Techniques: The use of DoH and WebSocket shows an evolution in cyber threats, aiming to evade network-based detection mechanisms. These techniques help the malware avoid detection from solutions that inadequately inspect DNS traffic or HTTPS connections.
Warning and Recommendations:
By following these best practices, users can significantly reduce the risk of falling victim to the Trojan Proxy malware campaign or similar threats targeting Mac devices.
Source and further reading:
Ahmed, D. (2023, October 11). VirusTotal reveals apps most exploited by hackers to spread malware.
Hackread - Latest Cybersecurity News, Press Releases & Technology Today.
https://www.hackread.com/virustotal-apps-exploited-hackers-spread-malware/
Puzan, S. (2023, December 5). New macOS Trojan-Proxy piggybacking on cracked software.
Securelist.
https://securelist.com/trojan-proxy-for-macos/111325/
Simon, M. (2023, December 4). New proxy trojan malware shows why you shouldn’t pirate Mac software.
Macworld.
https://www.macworld.com/article/2161932/macos-proxy-trojan-malware-pkg-bundle-pirated-apps.html