

However at this time, there is no indication that this happened.Perfect for singer-songwriters and content creators, the Onyx Artist 12 features an Onyx mic pre plus a ¼” input with Hi-Z switch for quick and easy recording.
#Onyx for mac 3.4.2 update
It should be noted that as the malware does (did?) have the ability to update itself, that attacker could have provided a customized payload. While this will likely use a large percentage of your CPU, that's about all the side-effects. Q: On an infected system, what can OSX/CreativeUpdater do?Ī: OSX/CreativeUpdater is designed to simply mine Monero (XMR) cryptocoins. KnockKnock tool will also display the launch agent plist ( ~/Library/mdworker/ist): This includes following files & directories: One can also look for the persistent artifacts of the malware. User 2199 /Users/user/Library/mdworker/ mdworker Q: How can I tell if I'm infected with OSX/CreativeUpdater?Ī: First check to see if there is an process named mdworker or sysmdworker running from the ~/Library/mdworker/: Once the certificate has been revoked the disk images won't mount nor applications run (via the UI): Moreover, Apple has revoked the certificate used to signed the malicious disk images and application: MacUpdate notes that they "have removed the link".

Users/ tiagobrandaomateus/teste/macupdate/OnyX 3.4.2_temp.dmg $ strings -a /Volumes/OnyX\ 3.4.2/.DS_Store | grep -i tiago Users/ tiagobrandaomateus/teste/macupdate/Firefox_temp.dmg The WhatsYourSign Finder extension, will display this signing information via the UI:Īs we'll shortly see, that malware will execute the legitimate Firefox application so that user will no suspect anything malicious has occurred!ĭecompiling the main executable, 'MozillaFirefox', we can see it looking for the 'script' file: It's easy to confirm the validity of the this second Firefox application by checking it's digital signature (and ensuring it's signed by Mozilla). Looking at contents of the trojaned Firefox application bundle, shows the main binary ( 'MozillaFirefox'), plus reveals another Firefox application as well as a script (aptly named 'script') in the Resources directory: The fact the both the disk image and application are signed means that Gatekeeper (in it's default settings) won't block malware from executing.

The application shown in the disk image, Firefox.app, is also signed with the same developer ID. $ hdiutil attach -noverify ~/Downloads/Firefox\ 58.0.2.dmg
#Onyx for mac 3.4.2 download
As noted by Thomas Reed, the download link on the MacUpdate site had been modified to point to a hacker controlled URL which served up the malware: So, a user is happily browsing MacUpdate, ends up at their listing for Firefox (or OnyX or Deeper).and decides to download it. provided valuable insight into both the discovery and analysis of the malware.also wrote a comprehensive blog post about this malware: "New Mac cryptominer distributed via a MacUpdate hack".brought the malware to my attention, provided links and insightful comments about the malware, and AFAIK gets credit for the name OSX/CreativeUpdater!.In this short blog post we'll dive into the malware, briefly discussing it's persistence mechanisms, and capabilities.īefore diving in, I want to thank the following security researchers and friends:

Specifically, on February 1st, the MacUpdate editor 'Jess-MacUpdate' added comments on several popular applications such as FireFox: Targeting macOS users, the malware was distributed via infected applications linked to on the popular MacUpdate website. We're barely into 2018, and already there is another Mac trojan going around. Want to play along? I've shared the malware, which can be downloaded here (password: infect3d).
