Traditionally, Mac customers have not needed to fear about malware as a lot as their Home windows-using cousins.
Though malware concentrating on Apple units really predates viruses written for PCs, and there have been some households of malware which have introduced a major risk for each working programs (as an illustration, the Phrase macro viruses that hit computer systems arduous from 1995 onwards), it’s usually the case that you just’re merely loads much less more likely to encounter malware in your Mac than you might be in your Home windows PC.
However that does not imply that Mac customers ought to be complacent. And the latest discovery of a brand new malware pressure emphasises that the risk – even when a lot smaller than on Home windows – stays actual.
Safety researchers at SentinelOne have warned that the brand new malware, dubbed “NotLockBit”, is concentrating on macOS programs – suggesting that cybercriminals are in search of victims who might have made the error of being extra relaxed about their pc safety.
Though it was initially suspected that the malware was linked to the infamous LockBit ransomware gang, additional evaluation means that the risk is a definite pressure falsely claiming affiliation.
In what might nearly be described as a “false-flag” operation, NotLockBit makes use of LockBit’s signature desktop wallpaper in what appears to be an try to mislead victims and safety researchers of its origin.
NotLockBit claims to be model 2.0, and but LockBit 3.0 was launched a while in the past, and key members of the LockBit gang have been arrested and its infrastructure seized.
Earlier ransomware threats in opposition to macOS customers have been largely proof-of-concept or have not become widespread.
The real LockBit ransomware group was accountable for producing a version of its ransomware for macOS final yr, however as a result of it was buggy and crashed simply it was not thought-about a critical risk.
The brand new malware analysed by SentinelOne’s researchers has been distributed as an x86-64 binary – that means that it’s going to solely run on Intel-based Macs and Macs utilizing the Rosetta emulation service.
In line with consultants NotLockBit seems to be “very a lot in improvement,” and there are at the moment no identified victims of the malware or proof that it’s being actively distributed within the wild.
However for those who had been to come across NotLockBit, on a Mac that would run it, then it will try to exfiltrate recordsdata out of your pc to AWS cloud storage buckets, encrypting information left behind in your Mac and including a .abcd suffix to their filenames.
The fast risk of this specific ransomware pattern has been decreased by its discovery, after the risk actors introduced it to the eye of researchers by importing to VirusTotal (seemingly in an try to see if any anti-virus merchandise would detect it as malicious).
That act prompted the safety neighborhood to take motion, and the AWS accounts utilized by the hackers through the data-exfiltration course of have been eliminated.
However we’d be silly to suppose that extra work received’t be carried out on this and different Mac ransomware within the months and years forward. As ever, corporations whose employees use Macs can be sensible to guard them with safety options to cut back the possibility of them being the weak hyperlink by way of which a malicious hacker can wreak havoc all through an organisation.
Editor’s Be aware: The opinions expressed on this visitor creator article are solely these of the contributor and don’t essentially mirror these of Tripwire.