![]() ![]() Updated to add Wardle’s opinion on what Apple could have done better.Handbrake is een van de populairste gratis dvd rippers, die voor Windows, Mac OS X en Linux te krijgen is. But, the HandBrake Team made sure to note that he is not part of the current HandBrake team of developers, and that they do not share their virtual machines with the Transmission Project. It’s interesting to note that the original developer of Transmission and Handbrake is the same person. The official website of the Transmission Project, which offers for download the Transmission BitTorrent client for Macs, has been compromised two times in the last year or so, and the software’s legitimate binary switched with malware: once with the KeRanger ransomware and the second time with the Keydnap credential stealer. So even if Apple had created a more robust signature, if the attackers were any good and wanted to continue to distribute the malware via this or a similar attack vector, they would be trivially able to bypass any signature.” This particular malware delivery tactic is not new “At the end of the day though, no signature based approach would stop the attackers. an infected handbrake app),” he told Help Net Security. However, since XProtect now supports YARA (which allows for more complex/reg-ex based signatures), I think it would have been wise to create a more generic signature – that would have at least thwarted variants of this same attack vector (i.e. “The reason why Apple chose such a specific signature is that they figured any new attack would use a new distribution vector (thus would be totally different) – so they figured they just use a specific signature for this attack/attack vector. He demonstrated this by changing the final byte of the binary – a move that changed it SHA-1 hash – and downloading it and installing it without any problem on a clean Mac. “This means if the malware authors used any other infection vector, or even just recompiled the binary, this signature would no longer flag the malware.” The signature is just a SHA-1 hash that matches only that specific Trojanized Handbrake binary, he noted. ![]() And, by now, it has added the signature for this particular Proton variant ().īut, according to Patrick Wardle, security researcher and developer of Mac security tools, that protection can be easily thwarted. What is Apple doing about this?Īpple has added a signature for the initial version of Proton to XProtect, the built-in macOS anti-malware scanner. “If ~/Library/VideoFrameworks/ contains proton.zip, remove the folder, then remove any ‘HandBrake.app’ installs you may have,” they added.įor finding and removing other malware, users are advised to use a reputable AV solution for Mac to scan their system. rm -rf ~/Library/RenderFiles/activity_agent.app.launchctl unload ~/Library/LaunchAgents/fr.handbrake.activity_ist. ![]() HandBrake developers advised infected users to change all the passwords in their macOS Keychain and any of the passwords they saved in their browsers.īut before doing that, they should make sure they have booted Proton and other malware it may have installed from their machine.įor removing Proton, the developers advise opening up Terminal.app and running the following commands: It is also capable of monitoring keystrokes, uploading files to and downloading files from a remote machine, webcam surveillance, and more.Īccording to the ad, it can also present a custom native window requesting users to enter information such as a credit card number, and can access the victim’s iCloud account – even if it’s protected with 2-factor authentication. The Proton RAT allows the attacker to connect remotely to the infected machine. Proton is a Remote Access Trojan (RAT) for macOS, and was spotted being sold on underground Russian cybercrime forums earlier this year.įor 40 Bitcoins, the buyers would get unlimited installations, and the malware was signed with a legitimate Apple developer signature, so it doesn’t get blocked by Apple’s Gatekeeper technology. (You can find the Activity Monitor in /Applications/Utilities). “If you see a process called ‘Activity_agent’ in the OSX Activity Monitor application, you are infected,” the developers noted. The primary download mirror and website have not been compromised. Only users who have downloaded the HandBrake-1.0.7.dmg file from the download mirror at are in danger. “Anyone who has downloaded HandBrake on Mac between and needs to verify the SHA1 / 256 sum of the file before running it,” the developers warned on Saturday, and prominently displayed a link to the alert on the project’s main page. dmg file switched with a Trojanized version containing the Proton RAT. A mirror download server of HandBrake, a popular open source video conversion app for Mac, has been compromised, and the legitimate app. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |