{"id":22175,"date":"2023-12-08T08:17:40","date_gmt":"2023-12-08T13:17:40","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/22175\/"},"modified":"2023-12-11T15:08:45","modified_gmt":"2023-12-11T11:08:45","slug":"macos-users-cyberthreats-2023","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/22175\/","title":{"rendered":"Are Macs safe? Threats to macOS users"},"content":{"rendered":"<p>Many Apple users believe the macOS operating system is so secure that no cyberthreats can harm them, so they don\u2019t need to worry about protecting their devices. However, this is far from the case: while there <em>is<\/em> less malware for macOS, it\u2019s still much more common than Apple device owners would like to think.<\/p>\n<p>In this post, we discuss current threats facing macOS users and how to effectively protect your Mac. To illustrate the fact that viruses for macOS do exist, we\u2019ll look at three recent studies on several malware families that have been published over the past few weeks.\n<\/p>\n<h2>BlueNoroff attacks macOS users and steals cryptocurrency<\/h2>\n<p>\nIn late October 2023, our researchers <a href=\"https:\/\/securelist.com\/bluenoroff-new-macos-malware\/111290\/\" target=\"_blank\" rel=\"noopener\">discovered a new macOS Trojan<\/a> that\u2019s believed to be associated with <a href=\"https:\/\/apt.securelist.com\/apt\/bluenoroff\" target=\"_blank\" rel=\"noopener\">BlueNoroff<\/a>, the \u201ccommercial wing\u201d of the <a href=\"https:\/\/apt.securelist.com\/apt\/lazarus\" target=\"_blank\" rel=\"noopener\">Lazarus<\/a> APT group. This subgroup specializes in financial attacks and specifically focuses on two things: firstly, attacks on the SWIFT system \u2014 including the notorious <a href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-modus-operandi-and-countermeasures\/6716\/\" target=\"_blank\" rel=\"noopener nofollow\">heist of the Bangladesh Central Bank<\/a> \u2014 and secondly, stealing cryptocurrencies from organizations and individuals.<\/p>\n<p>The discovered macOS <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/trojan-downloader\/\" target=\"_blank\" rel=\"noopener\">Trojan downloader<\/a> is distributed within malicious archives. It\u2019s disguised as a PDF document titled \u201cCrypto-assets and their risks for financial stability\u201d, with an icon that mimics a preview of this document.<\/p>\n<div id=\"attachment_50020\" style=\"width: 2327px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/12\/08171929\/macos-users-cyberthreats-2023-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50020\" class=\"size-full wp-image-50020\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/12\/08171929\/macos-users-cyberthreats-2023-01.png\" alt=\"BlueNoroff\/RustBucket: decoy PDF cover page\" width=\"2317\" height=\"1104\"><\/a><p id=\"caption-attachment-50020\" class=\"wp-caption-text\">Cover page of the deceptive PDF that the Trojan downloads and shows to the user when launching the file from an infected archive. <a href=\"https:\/\/securelist.com\/bluenoroff-new-macos-malware\/111290\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<p>Once the user clicks on the Trojan (masquerading as a PDF), a script is executed that actually downloads the corresponding PDF document from the internet and opens it. But, of course, that\u2019s not all that happens. The Trojan\u2019s main task is to download another virus, which gathers information about the infected system, sends it to the C2, and then waits for a command to perform one of two possible actions: self-deletion or saving to a file and executing malicious code sent in response from the server.\n<\/p>\n<h2>Proxy Trojan in pirated software for macOS<\/h2>\n<p>\nIn late November 2023, our researchers discovered another malware instance that threatens Mac users \u2014 a proxy Trojan, distributed alongside pirated software for macOS. Specifically, this Trojan was added to the PKG files of cracked video editing programs, data recovery tools, network utilities, file converters, and various other software. The full list of infected installers discovered by our experts can be found at the end of the <a href=\"https:\/\/securelist.com\/trojan-proxy-for-macos\/111325\/\" target=\"_blank\" rel=\"noopener\">report published on Securelist<\/a>.<\/p>\n<p>As mentioned earlier, this malware belongs to the category of proxy Trojans \u2014 malware that sets up a proxy server on the infected computer, essentially creating a host to redirect internet traffic. Subsequently, cybercriminals can use such infected devices to build a paid network of proxy servers, earning money from those seeking such services.<\/p>\n<p>Alternatively, the Trojan\u2019s owners might directly use the infected computers to carry out criminal activities in the victim\u2019s name \u2014 whether it\u2019s attacking websites, companies or other users, or purchasing weapons, drugs or other illegal goods.\n<\/p>\n<h2>Atomic stealer in fake Safari browser updates<\/h2>\n<p>\nAlso in November 2023, a new malicious campaign was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/atomic-stealer-malware-strikes-macos-via-fake-browser-updates\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> to spread another Trojan for macOS, known as Atomic and belonging to the category of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan-psw-psw-password-stealing-ware\/\" target=\"_blank\" rel=\"nofollow noopener\">stealers<\/a>. This type of malware searches for, extracts, and sends to its creators all kinds of valuable information found on the victim\u2019s computer, particularly data saved in browsers. Logins and passwords, bank card details, crypto wallet keys, and similar sensitive information are of particular value to stealers.<\/p>\n<p>The Atomic Trojan was first <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-atomic-macos-info-stealing-malware-targets-50-crypto-wallets\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered and described<\/a> back in March 2023. What\u2019s new is that now the attackers have started using fake updates for the Safari and Chrome browsers to spread the Atomic Trojan. These updates are downloaded from malicious pages that very convincingly mimic the original Apple and Google websites.<\/p>\n<div id=\"attachment_50022\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/12\/08171945\/macos-users-cyberthreats-2023-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50022\" class=\"size-full wp-image-50022\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/12\/08171945\/macos-users-cyberthreats-2023-02.jpg\" alt=\"Fake Safari browser updates with the stealer Trojan inside\" width=\"1600\" height=\"1198\"><\/a><p id=\"caption-attachment-50022\" class=\"wp-caption-text\">A site with fake Safari browser updates that actually contain the Atomic stealer. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/atomic-stealer-malware-strikes-macos-via-fake-browser-updates\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Once running on a system, the Atomic Trojan attempts to steal the following information from the victim\u2019s computer:\n<\/p>\n<ul>\n<li>cookies<\/li>\n<li>logins, passwords, and bank card details stored in the browser<\/li>\n<li>passwords from the macOS password storage system (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Keychain_(software)\" target=\"_blank\" rel=\"nofollow noopener\">Keychain<\/a>)<\/li>\n<li>files stored on the hard drive<\/li>\n<li>stored data from over 50 popular cryptocurrency extensions<\/li>\n<\/ul>\n<h2>Zero-day vulnerabilities in macOS<\/h2>\n<p>\nUnfortunately, even if you don\u2019t download any suspicious files, you avoid opening attachments from unknown sources, and generally refrain from clicking on anything suspicious, this doesn\u2019t guarantee your security. It\u2019s important to remember that any software always has vulnerabilities that attackers can exploit to infect a device, and which require little or no active user action. And the macOS operating system is no exception to this rule.<\/p>\n<p>Recently, two zero-day vulnerabilities were <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-fixes-two-new-ios-zero-days-in-emergency-updates\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> in the Safari browser \u2014 and according to <a href=\"https:\/\/support.apple.com\/en-us\/HT214031\" target=\"_blank\" rel=\"nofollow noopener\">Apple\u2019s announcement<\/a>, cybercriminals were already exploiting them by the time they were discovered. By simply luring the victim to a malicious webpage, attackers can infect their device without any additional user action, thereby gaining control over the device and the ability to steal data from it. These vulnerabilities are relevant for all devices using the Safari browser, posing a threat to both iOS\/iPadOS users and Mac owners.<\/p>\n<p>This is a common scenario: as Apple\u2019s operating systems share many components, vulnerabilities often apply not just to one of the company\u2019s opertaing systems but to all of them. Thus, it\u2019s a case of Macs being betrayed by the iPhone\u2019s popularity: iOS users are the primary targets, but these vulnerabilities can just as easily be used to attack macOS.<\/p>\n<p>A total of 19 zero-day vulnerabilities were discovered in Apple\u2019s operating systems in 2023 that are known to have been actively exploited by attackers. Of these, 17 affected macOS users \u2014 including over a dozen with high-risk status, and one classified as critical.<\/p>\n<div id=\"attachment_50021\" style=\"width: 2304px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/12\/08172006\/macos-users-cyberthreats-2023-03.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50021\" class=\"size-full wp-image-50021\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/12\/08172006\/macos-users-cyberthreats-2023-03.png\" alt=\"Zero-day vulnerabilities in iOS and macOS: CVE-2023-42917, CVE-2023-42916, CVE-2023-42824, CVE-2023-41993, CVE-2023-41992, CVE-2023-41991, CVE-2023-41064, CVE-2023-41061, CVE-2023-38606, CVE-2023-37450, CVE-2023-32439, CVE-2023-32435, CVE-2023-32434, CVE-2023-32409, CVE-2023-32373, CVE-2023-28204, CVE-2023-28206, CVE-2023-28205, CVE-2023-23529\" width=\"2294\" height=\"1606\"><\/a><p id=\"caption-attachment-50021\" class=\"wp-caption-text\">Zero-day vulnerabilities in macOS, iOS, and iPadOS discovered in 2023, which were actively exploited by cybercriminals<\/p><\/div>\n<h2>Other threats and how to protect your Mac<\/h2>\n<p>\nWhat\u2019s important to remember is that there are numerous cyberthreats that don\u2019t depend on the operating system but that can be no less dangerous than malware. In particular, pay attention to the following threats:\n<\/p>\n<ul>\n<li>\n<strong><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">Phishing<\/a><\/strong><strong> and fake websites.<\/strong> Phishing emails and websites work the same way for both Windows users and Mac owners. Alas, not all fake emails and websites are easily recognizable, so even experienced users often face the risk of having their login credentials stolen.<\/li>\n<li>\n<strong>Web threats, including <a href=\"https:\/\/www.kaspersky.com\/blog\/illicit-code-on-legitimate-sites\/48509\/\" target=\"_blank\" rel=\"noopener nofollow\">web skimmers<\/a><\/strong><strong>.<\/strong> Malware can infect not only the user\u2019s device but also the server it communicates with. For example, attackers often hack poorly protected websites, especially online stores, and install web skimmers on them. These small software modules are designed to intercept and steal bank card data entered by visitors.<\/li>\n<li>\n<strong>Malicious <a href=\"https:\/\/www.kaspersky.com\/blog\/dangers-of-browser-extensions\/45448\/\" target=\"_blank\" rel=\"noopener nofollow\">browser extensions<\/a><\/strong><strong>.<\/strong> These small software modules are installed directly into the browser and operate within it, so they don\u2019t depend on the OS being used. Despite being seemingly harmless, extensions can do a lot: read the content of all visited pages, intercept information entered by the user (passwords, card numbers, keys to crypto wallets), and even replace displayed page content.<\/li>\n<li>\n<strong>Traffic interception and <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle<\/a><\/strong><strong> (MITM) attacks.<\/strong> Most modern websites use encrypted connections (HTTPS), but you can still sometimes come across HTTP sites where data exchange can be intercepted. Cybercriminals use such interception to launch MITM attacks, presenting users with fake or infected pages instead of legitimate ones.<\/li>\n<\/ul>\n<p>\nTo protect your device, online service accounts and, most importantly, the valuable information they contain, it\u2019s crucial to use <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-protection-for-financial-security\/49616\/\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive protection<\/a> for both Mac computers and iPhones\/iPads. Such protection must be able to counteract the entire range of threats \u2014 for example solutions like our <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>, whose effectiveness has been confirmed by numerous awards from independent testing laboratories.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.<\/p>\n","protected":false},"author":2706,"featured_media":22177,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1097,1474,14,477,2714,1505,2715,1702,1328,187,2151,521,268],"class_list":{"0":"post-22175","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-0days","9":"tag-accounts","10":"tag-apple","11":"tag-apt","12":"tag-bluenoroff","13":"tag-cryptocurrencies","14":"tag-ecurity","15":"tag-lazarus","16":"tag-macos","17":"tag-passwords","18":"tag-stealers","19":"tag-threats","20":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/22175\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/macos-users-cyberthreats-2023\/26761\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/29512\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/macos-users-cyberthreats-2023\/27029\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/26912\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/macos-users-cyberthreats-2023\/29483\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/macos-users-cyberthreats-2023\/28315\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/macos-users-cyberthreats-2023\/36683\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/50018\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/macos-users-cyberthreats-2023\/21320\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/macos-users-cyberthreats-2023\/22094\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/macos-users-cyberthreats-2023\/30758\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/macos-users-cyberthreats-2023\/35433\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/macos-users-cyberthreats-2023\/27273\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/macos-users-cyberthreats-2023\/33045\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/macos-users-cyberthreats-2023\/32668\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22175"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22175\/revisions"}],"predecessor-version":[{"id":22179,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22175\/revisions\/22179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22177"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}