Feeds

Malware-flingers do it back-to-front : scaM snaps, spans Macs

The mullet of nasty file extensions

Securing Web Applications Made Simple and Scalable

Miscreants have brewed up an exceptionally sneaky strain of Mac malware that uses back-to-front trickery to disguise its true nature.

Janicab, which is written in Python, takes advantage of the right-to-left (RTL) U202E Unicode character to mask the malicious file’s real extension. The U202E marker applies a right-to-left override for the display of part (but only part) of the malware’s filename.

So a file which appears to be called RecentNews.ppa.pdf is actually RecentNews.fdp.app. The is designed to trick users into thinking they are opening a .PDF file which is in reality an an executable .APP.

This sort of back-to-front trickery has been seen in Windows malware in the past - such as Bredolab and the high-profile Mahdi trojan from last year - but it's reckoned to be a new and unwelcome arrival on Macs.

In order to maintain the subterfuge, the malware displays a decoy document while silently executing in the background, installing malicious code on compromised Macs.

Because of the right-to-left override character, the usual file quarantine notification from OS X will also display with the words written backwards.

Beware this download

Beware this download Credit: F-Secure

Adding an extra layer of sneakiness, the malware has been signed with an Apple Developer ID.

The nasty is designed to record audio and capture screenshots from infected computers, using the third-party command line utility SoX.

This information is then uploaded to a command-and-control server whose location is defined by pages on seemingly innocuous pages on YouTube.

A full write-up on the attack, together with screenshots, can be found in a blog post by F-Secure, the Finnish anti-virus firm that was the first to issue a warning about the threat.

A good explanation of the right-to-left trickery that's the main feature of the malware can be found in a blog post by independent anti-virus expert Graham Cluley here.

And a hat tip for David Harley of Eset who described to back-to-front mendaciousness as "Malice through the looking glass".

None of the antivirus experts have stuck their necks out on this point, but the amount of care taken to put together the malware smack of some sort of cyber-espionage campaign rather than common or garden cybercrime.

The decoy document dropped by Janicab is in Russian and that may well have something to do with the target audience. ®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you on YouPorn lately, perhaps? White House website?
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.