Home Security Attackers using Mono to run Windows malware on macOS: claim
Attackers using Mono to run Windows malware on macOS: claim Image by Eduardo Taboada from Pixabay

The Mono framework, a free system that lets users run Windows applications on other operating systems, including macOS, is allowing malicious attackers to infect Apple systems with Windows malware.

Mono was developed by Miguel de Icaza, a co-founder of the GNOME desktop project, a DE that is used by Linux systems. De Icaza is now employed by Microsoft.

The security firm Kaspersky Lab pointed out that malicious attackers were collecting data about Apple systems and feeding it into adware using files with an .exe extension – files which normally run only on Windows.

To add to the irony, this was done with pirated copies of the Little Snitch firewall and users who tried to avoid paying for a licence ended up with malware instead, researcher Leonid Grustniy said.

"The infected version of the firewall was distributed using torrents. Victims downloaded to their computers a ZIP archive with a disk image in DMG format — so far, normal.

"But a close look at the contents of this DMG file reveals the presence of the MonoBundle folder with a certain installer.exe inside. This is not a typical macOS object; EXE files usually just don’t run on Mac machines."

Grustniy pointed out that Windows executables were unsupported by macOS to the extent that the Gatekeeper security feature in macOS simply ignored .exe files.

"As you can probably guess, the Mono framework is what the cyber criminals exploited," Grustniy said. "A framework usually needs to be installed on the computer separately, but these cyber crooks came up with a method of packaging it with the malware (remember the sinister EXE in the MonoBundle folder?). As a result, the malware runs successfully even on Macs whose owners use only native programs."

When installed, the malware collected information about the host system and sent this, along with data about the installed applications, to its command and control server.

"Simultaneously, it downloads several more images to the infected computer with installers masked as Adobe Flash Media Player, or Little Snitch. They are in fact run-of-the-mill adware tools that pester you with banners," said Grustniy.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect