Are you concerned about your Mac’s security? Update immediately

Ismail R.
2 min readJan 25, 2024

--

Cybersecurity researchers have uncovered a dangerous backdoor lurking within pirated applications targeting Apple macOS users. These applications, deceptively hosted on Chinese pirating websites, are laced with malicious code that grants attackers remote control over compromised machines.

Once unsuspecting users open these pirated apps, the backdoor springs into action, silently downloading and executing multiple payloads to completely infiltrate the victim’s device. The compromised machine becomes a puppet in the hands of malicious actors, allowing them to steal sensitive data, install additional malware, and wreak havoc on the user’s system.

The backdoored applications, disguised as legitimate software like Navicat Premium, UltraEdit, FinalShell, SecureCRT, and Microsoft Remote Desktop, seem harmless to unsuspecting users. However, upon execution, these seemingly innocent apps unleash a torrent of malicious activity.

The dropper component, embedded within the unsigned applications, plays a crucial role in initiating the backdoor’s operations. Every time the pirated app is launched, the dropper fetches two critical components from a remote server: the backdoor itself (bd.log) and a downloader (fl01.log).

The backdoor, written to the path “/tmp/.test,” is a fully-fledged tool built upon the open-source post-exploitation toolkit Khepri. This backdoor grants attackers remote control over the compromised machine, enabling them to execute commands, steal sensitive data, and install further malware.

While the backdoor is temporary and will be deleted when the system restarts, the downloader ensures its persistence. It resides in the hidden path “/Users/Shared/.fseventsd” and creates a LaunchAgent to automatically launch the backdoor upon system startup.

The downloader also establishes communication with the remote server, sending an HTTP GET request to fetch additional payloads. These payloads could be anything from more malware to even ransomware, further escalating the damage inflicted on the infected machine.

Protect Yourself from This Malicious Threat

To safeguard your Apple macOS device from this insidious backdoor, follow these crucial steps:

  1. Avoid Pirated Software: Pirated software often contains malicious code, so it’s crucial to only download and use legitimate software from trusted sources.
  2. Keep Your Software Updated: Regularly update your macOS operating system and applications to ensure you have the latest security patches and protections.
  3. Beware of Phishing Attacks: Phishing emails and websites often try to trick you into downloading malicious software. Be wary of suspicious links and attachments, and only download software from trusted sources.
  4. Use Security Software: Implement robust cybersecurity software to detect and block malicious attacks.
  5. Back Up Your Data: Regularly back up your important data to prevent data loss in case of a cyberattack.

By following these simple precautions, you can significantly reduce your risk of falling victim to this backdoor and other malicious threats.

--

--

Ismail R.
Ismail R.

Written by Ismail R.

Early passion for computers led to a professional focus on aligning business with IT. Balancing academic and practical experience, especially in cybersecurity.

No responses yet