1 week ago
15 Views

completely new Undetectable DNS Hijacking Malware Targeting Apple macOS Users

macos-dns-hijacker-malware

A security researcher has revealed details of a completely new piece of undetectable malware targeting Apple’s Mac computers—reportedly first macOS malware of 2018.

Dubbed OSX/MaMi, an unsigned Mach-O 64-bit executable, the malware is usually somewhat similar to DNSChanger malware which infected millions of computers across the planet in 2012.

DNSChanger malware typically modifications DNS server settings on infected computers, allowing attackers to route internet traffic through malicious servers as well as intercept sensitive information.

First appeared on the Malwarebytes forum, a user posted a query regarding unknown malware which infected his friend’s computer which silently changed DNS settings on infected macOS to 82.163.143.135 as well as 82.163.142.137 addresses.

After looking at the post, ex-NSA hacker Patrick Wardle analysed the malware as well as found which the item is usually indeed a ‘DNS Hijacker,‘ which also invokes security tools to install a completely new root certificate in an attempt to intercept encrypted communications as well.

macos-root-certificate-malware

OSX/MaMi isn’t particularly advanced – nevertheless does alter infected systems in rather nasty as well as persistent ways,” Patrick said.

By installing a completely new root certificate as well as hijacking the DNS servers, the attackers can perform a variety of nefarious actions such as man-in-the-middle’ing traffic (perhaps to steal credentials, or inject ads)” or to insert cryptocurrency mining scripts into web pages.

Besides This particular, the OSX/MaMi macOS malware, which appears to be in its initial stage, also includes below-mentioned abilities, most of which are not currently activated in its variation 1.1.0:

  • Take screenshots
  • Generate simulated mouse events
  • Perhaps persist as a launch item
  • Download as well as upload files
  • Execute commands

The motive, author(s) behind the malware, as well as how the item is usually spreading are currently unknown.


However, Patrick believes which the attackers could be using lame methods like malicious emails, web-based fake security alerts/popups, or social-engineering type attacks to target Mac users.

To check if your Mac computer is usually infected with MaMi malware, go to the terminal via the System Preferences app as well as check for your DNS settings—particularly look for 82.163.143.135 as well as 82.163.142.137.

virustotal-dns-changer-mawlare

According to VirusTotal, a multi-engine antivirus scanner, none of 59 favorite antivirus software is usually detecting This particular malware at This particular moment, so you are advised to use a 3rd-party tool such as a firewall which can detect as well as block outgoing traffic.

You can also install a free open-source firewall for macOS named ‘LuLu,’ created by Patrick as well as available at GitHub, which blocks suspicious traffic as well as prevents OSX/MaMi’s coming from stealing your data.

Article Categories:
Security Hacks

Leave a Comment

Your email address will not be published. Required fields are marked *

eighteen − 9 =