SlideShare a Scribd company logo
1 of 29
Mac OS X Malware: From Myth to
Mainstream



Vicente Diaz, Senior Security Analyst, Global Research & Analysis Team, Kaspersky Lab


Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012
Mac OS X: security from a user´s perspective
Wait a minute…
The cybercriminals’ checklist

                            Recipe for an infection:

                            1.Vulnerability
                            2.Exploit
                            3.Attack vector

                                Or

                            4.Fooling the user
Mac OS X vulnerabilities in the past…
And even more vulnerabilities now

 450

 400

 350

 300

 250                                                                   Advisories
                                                                       Vulnerabilities
 200

 150

 100

  50

   0
          2008          2009         2010         2011         2012*
Source: Apple Security Updates: http://support.apple.com/kb/HT1222
Apple’s management of Mac OS X vulnerabilities




                          32 days

                          20 days

                          48 days
The cybercriminals’ checklist


                            Recipe for an infection:

                            1. Vulnerability
                            2. Exploit
                            3. Attack vector

                                Or

                            4.Fooling the user
Mac OS X’s pre-installed protection measures

                               ASLR      Stack protection        XProtect
                   2005   No            No                  Only warnings


OSX 10.4 Tiger
                   2007   Buggy -       Optional            Only warnings
                          useless

OSX 10.5 Leopard
                   2009   Buggy -       OS compiled with    Enhanced
                          useless       protection

OSX 10.6 Snow Leopard
                   2011   Fully         OS compiled with    Enhanced
                          implemented   protection


OSX 10.7 Lion
Introducing … Xprotect (aka File Quarantine)




             Live Demo
The future of Mac OS X protection
The cybercriminals’ checklist

                            Recipe for an infection:

                            1. Vulnerability
                            2. Exploit
                            3. Attack vector

                                Or

                            4. Fooling the user
Attack vectors

Targeted attacks




Compromised websites




Black Hat SEO
The cybercriminals’ checklist

                           Recipe for an infection:

                           1. Vulnerability
                           2. Exploit
                           3. Attack Vector

                                Or

                           4. Fooling the user
If what you say is true…show me the malware
Mac OS X malware over time



                  Scareware             Remote control




    2008                       2010
                   2009                         2011


DNSChanger
                               FakeAV
100
                                                 150
                                                       200
                                                             250
                                                                   300




                                      50




                                  0
                        2003.08
                        2004.12
                        2005.08
                        2005.09
                        2005.10
                        2005.11
                        2005.12
                        2006.02
                        2006.03
                        2006.07




Source: Kaspersky Lab
                        2006.11
                        2006.12
                        2007.01
                        2007.05
                        2008.01
                        2008.05
                        2008.06
                        2008.07
                        2008.11
                        2009.01
                        2009.05
                        2009.09
                                                                         Mac OS X’s malware evolution




                        2009.10
                        2009.11
                        2009.12
                        2010.01
                        2010.02
                        2010.03
                        2010.04
                        2010.07
                        2010.10
                        2010.11
                        2010.12
                        2011.02
                        2011.05
                        2011.06
                        2011.08
                        2011.09
                        2011.10
                        2011.11
                        2011.12
                        2012.01
                        2012.02
                        2012.03
                        2012.04
Case Study 1: Flashback
Flashback attack method
Flashback attack vector


          Main infection vector: Hacked WordPress sites

          Late February to early March: between 30,000 and
          100,000 sites were hacked

          85% of hacked sites were based in the U.S.


          Traffic hired from partner program associated with the
          rr.nu gang

          Depending on OS and browser, victims are redirected
          to an exploit
Geographical distribution of infected Mac OS X computers
Case Study 2: SabPub
Advanced Persistent Threat targeting MAC OS X users

  The “10th March Stamnet”   Doc files from 2010, rearmed with new
                             exploits

                                      CVE-2009-0563 – targets Office


                                      CVE-2012-0507 – targets Java


                             Installs backdoor on victim´s machine


                             APT is currently ACTIVE
What has changed?
Mac OS X’s growth in market share
Call to action: Apple’s security update process


• Allow Oracle to patch Mac OS X vulnerabilities
in Java directly, rather than issuing your own
security updates.

• Implement automatic security updates for user
systems

• Respond faster to new security vulnerabilities to
minimize window of exploitation
Conclusions & predictions for users

• The myth of Mac OS X being
  invulnerable to malware has been
  shattered
• Use AV software and proper security
  practices to protect yourself
• Mac OS X mass-malware attacks will
  increase. This will include drive-by
  downloads and Mac OS X-based
  botnets
• Expect cross-platform exploit kits with
  Mac OS X-specific exploits
• Apple is pushing for a more controlled
  ecosystem (GateKeeper) but this will
  be a cat-and-mouse game.
Thank You



Vicente Diaz, Senior Security Analyst, Global Research & Analysis Team, Kaspersky Lab
@trompi

Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012

More Related Content

Similar to Mac OS X Malware: From Myth to Mainstream

Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Scaling the Britain's Got Talent Buzzer
Scaling the Britain's Got Talent BuzzerScaling the Britain's Got Talent Buzzer
Scaling the Britain's Got Talent BuzzerMalcolm Box
 
Securing Modern Applications: The Data Behind DevSecOps
Securing Modern Applications: The Data Behind DevSecOpsSecuring Modern Applications: The Data Behind DevSecOps
Securing Modern Applications: The Data Behind DevSecOpsEficode
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentationquestar
 
Metasploit-TOI-Ebryx-PVT-Ltd
Metasploit-TOI-Ebryx-PVT-LtdMetasploit-TOI-Ebryx-PVT-Ltd
Metasploit-TOI-Ebryx-PVT-LtdAli Hussain
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
Can consumer av products protect
Can consumer av products protectCan consumer av products protect
Can consumer av products protectAnatoliy Tkachev
 
Ofer Maor - OWASP Top 10
Ofer Maor -  OWASP Top 10Ofer Maor -  OWASP Top 10
Ofer Maor - OWASP Top 10CSAIsrael
 
The Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackThe Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackPrathan Phongthiproek
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedAlfons Tanujaya
 
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threatBasic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threatVladyslav Radetsky
 
App. Specific Business 10ImpactsThreatAgentsA.docx
App. Specific Business 10ImpactsThreatAgentsA.docxApp. Specific Business 10ImpactsThreatAgentsA.docx
App. Specific Business 10ImpactsThreatAgentsA.docxarmitageclaire49
 
Resume_ChuangCao
Resume_ChuangCaoResume_ChuangCao
Resume_ChuangCaoChuang Cao
 

Similar to Mac OS X Malware: From Myth to Mainstream (20)

Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Windows vs mac os
Windows vs mac osWindows vs mac os
Windows vs mac os
 
Scaling the Britain's Got Talent Buzzer
Scaling the Britain's Got Talent BuzzerScaling the Britain's Got Talent Buzzer
Scaling the Britain's Got Talent Buzzer
 
Securing Modern Applications: The Data Behind DevSecOps
Securing Modern Applications: The Data Behind DevSecOpsSecuring Modern Applications: The Data Behind DevSecOps
Securing Modern Applications: The Data Behind DevSecOps
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentation
 
Metasploit-TOI-Ebryx-PVT-Ltd
Metasploit-TOI-Ebryx-PVT-LtdMetasploit-TOI-Ebryx-PVT-Ltd
Metasploit-TOI-Ebryx-PVT-Ltd
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
Can consumer av products protect
Can consumer av products protectCan consumer av products protect
Can consumer av products protect
 
Ofer Maor - OWASP Top 10
Ofer Maor -  OWASP Top 10Ofer Maor -  OWASP Top 10
Ofer Maor - OWASP Top 10
 
The Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackThe Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) Attack
 
Resume
ResumeResume
Resume
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
 
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threatBasic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
 
App. Specific Business 10ImpactsThreatAgentsA.docx
App. Specific Business 10ImpactsThreatAgentsA.docxApp. Specific Business 10ImpactsThreatAgentsA.docx
App. Specific Business 10ImpactsThreatAgentsA.docx
 
TS-5358
TS-5358TS-5358
TS-5358
 
TS-5358
TS-5358TS-5358
TS-5358
 
Resume_ChuangCao
Resume_ChuangCaoResume_ChuangCao
Resume_ChuangCao
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Mac OS X Malware: From Myth to Mainstream

  • 1. Mac OS X Malware: From Myth to Mainstream Vicente Diaz, Senior Security Analyst, Global Research & Analysis Team, Kaspersky Lab Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012
  • 2. Mac OS X: security from a user´s perspective
  • 4. The cybercriminals’ checklist Recipe for an infection: 1.Vulnerability 2.Exploit 3.Attack vector Or 4.Fooling the user
  • 5. Mac OS X vulnerabilities in the past…
  • 6. And even more vulnerabilities now 450 400 350 300 250 Advisories Vulnerabilities 200 150 100 50 0 2008 2009 2010 2011 2012* Source: Apple Security Updates: http://support.apple.com/kb/HT1222
  • 7. Apple’s management of Mac OS X vulnerabilities 32 days 20 days 48 days
  • 8. The cybercriminals’ checklist Recipe for an infection: 1. Vulnerability 2. Exploit 3. Attack vector Or 4.Fooling the user
  • 9. Mac OS X’s pre-installed protection measures ASLR Stack protection XProtect 2005 No No Only warnings OSX 10.4 Tiger 2007 Buggy - Optional Only warnings useless OSX 10.5 Leopard 2009 Buggy - OS compiled with Enhanced useless protection OSX 10.6 Snow Leopard 2011 Fully OS compiled with Enhanced implemented protection OSX 10.7 Lion
  • 10. Introducing … Xprotect (aka File Quarantine) Live Demo
  • 11. The future of Mac OS X protection
  • 12. The cybercriminals’ checklist Recipe for an infection: 1. Vulnerability 2. Exploit 3. Attack vector Or 4. Fooling the user
  • 14. The cybercriminals’ checklist Recipe for an infection: 1. Vulnerability 2. Exploit 3. Attack Vector Or 4. Fooling the user
  • 15. If what you say is true…show me the malware
  • 16. Mac OS X malware over time Scareware Remote control 2008 2010 2009 2011 DNSChanger FakeAV
  • 17. 100 150 200 250 300 50 0 2003.08 2004.12 2005.08 2005.09 2005.10 2005.11 2005.12 2006.02 2006.03 2006.07 Source: Kaspersky Lab 2006.11 2006.12 2007.01 2007.05 2008.01 2008.05 2008.06 2008.07 2008.11 2009.01 2009.05 2009.09 Mac OS X’s malware evolution 2009.10 2009.11 2009.12 2010.01 2010.02 2010.03 2010.04 2010.07 2010.10 2010.11 2010.12 2011.02 2011.05 2011.06 2011.08 2011.09 2011.10 2011.11 2011.12 2012.01 2012.02 2012.03 2012.04
  • 18. Case Study 1: Flashback
  • 19.
  • 21. Flashback attack vector Main infection vector: Hacked WordPress sites Late February to early March: between 30,000 and 100,000 sites were hacked 85% of hacked sites were based in the U.S. Traffic hired from partner program associated with the rr.nu gang Depending on OS and browser, victims are redirected to an exploit
  • 22. Geographical distribution of infected Mac OS X computers
  • 23. Case Study 2: SabPub
  • 24. Advanced Persistent Threat targeting MAC OS X users The “10th March Stamnet” Doc files from 2010, rearmed with new exploits CVE-2009-0563 – targets Office CVE-2012-0507 – targets Java Installs backdoor on victim´s machine APT is currently ACTIVE
  • 26. Mac OS X’s growth in market share
  • 27. Call to action: Apple’s security update process • Allow Oracle to patch Mac OS X vulnerabilities in Java directly, rather than issuing your own security updates. • Implement automatic security updates for user systems • Respond faster to new security vulnerabilities to minimize window of exploitation
  • 28. Conclusions & predictions for users • The myth of Mac OS X being invulnerable to malware has been shattered • Use AV software and proper security practices to protect yourself • Mac OS X mass-malware attacks will increase. This will include drive-by downloads and Mac OS X-based botnets • Expect cross-platform exploit kits with Mac OS X-specific exploits • Apple is pushing for a more controlled ecosystem (GateKeeper) but this will be a cat-and-mouse game.
  • 29. Thank You Vicente Diaz, Senior Security Analyst, Global Research & Analysis Team, Kaspersky Lab @trompi Kaspersky Security for Mac Launch Event, Moscow, 14-16, May 2012

Editor's Notes

  1. Users feel like they are invulnerableApple itself decided back in 2008 that it would not suggest using any antivirus packageThe company’s stance is quite contradictory however: they say it offers additional security … when supposedly it is not needed!
  2. Wow, those guys are great! However, just to be sure, let’s check it out
  3. Java vulnerabilties: patchesprovidedby Oracle, but Java isresponsibleforthis JRE implementation and patchingUsers of OSX olderthan Snow Leopard are notcovered!Tiger wasreleasedlessthan 5 yearsago and isnotcovered. Thislifespanistoo short, especiallyforbusinessusers
  4. In the case of Office, third-party software was the open door – but faulty ASLR implementation made the exploit possible.TheJava patch was made by Oracle, but Java is still responsible as they implement their own version of the JRE. In this case the problem was a logic bug that allowed the attack to jump out of the sandbox in a privileged environment.
  5. It took four years to get even basic anti-exploit measures fully implemented on Lion.Apple’s vision is to prevent its computers from running software apart from trusted apps sold in its stores, and storing its data in iCloud.BUT: if the cloud is compromised (see dropbox problems); if the apps in the appstore are compromised (see android marketplace problems); if the user does not stick to the rules, or the ecosystem is broken (jailbreaks), then the risks remain. Exploits are still possible, social engineering is still possible, credentials can still be stolen and malicious code can be developed and deployed.This raises the bar on Mac OS X security and makes it harder and more expensive to attack an Apple machine. That’s the good news. But don’t get carried away: the system will still be a target.
  6. These are the main attack vectors, and we have examples of all of them. But there are many other possibilities as well.
  7. Wow, those guys are great! However, just to be sure, let’s check it out
  8. Imunizator (scareware), DNSChanger (fake codec), HellRaiser (Remote control), MacDefender (fake AV)
  9. The amount of malware targeting Macs rocketed in 2011
  10. Source:https://www.securelist.com/en/analysis/204792227/The_anatomy_of_Flashfake_Part_1
  11. sum-up stats based on IP addresses (not UUID) which were found in the botnet during the whole period of research
  12. Two versions of SabPub have evolved quickly to use new exploitsATP active (goat machine)Wake-up call for companies, governments and business users using Mac OS XGangrelated to LuckyCat.
  13. The market share shows the tipping point. Is not the number of samples or vulnerabilities, it is the number of potential victims.Fairly significant share among business users and advanced markets.
  14. Allow Oracle to patch Mac OS X vulnerabilities in Java directly rather than issuing your own security updates. Make security a priority and take the onus off the user to install security updates. Issue updates that install automatically on users’ systems rather than sending reminder prompts. Teach users how to enhance the security settings on their computers so they don’t fall victim to cybercriminals and mass-malware attacks. Swifter response to new security vulnerabilities. Do not wait several months to issue an update – the longer the delay, the longer cybercriminals can exploit the problem.
  15. Mac OS X is no safer than any other operating system – take security updates seriously and install them as soon as they’re available.Use antivirus software: the myth of Mac OS X being invulnerable to malware has been shattered.Increased market share motivates cybercriminals. Expect more drive-by downloads, mass-malware attacks and Mac OS X-based botnets to appear.Apple is pushing for a more controlled ecosystem (GateKeeper) but this will be a cat-and-mouse game instead of a bulletproof security solution.Expect cross-platform exploit kits with Mac OS X-specific exploits included.