
The name was carefully chosen: “mdworker” is also the name of a legitimate system binary that powers the Mac’s Spotlight search functionality.
#Malware used runonly applescripts to five install
The aim was to get cryptocurrency users to install a trojanized application for trading and managing cryptocurrency.Īll versions were built using Electron, and once the trojan app is installed and launched, a malicious background process called “mdworker” functions as the RAT, capable of keylogging, taking screenshots, executing shell commands, and uploading and downloading files. This was the first of an increasingly common-trend throughout 2021: cross-platform malware written in Go targeting macOS, Linux and Windows operating systems. In January 2021, Intezer reported on Operation ElectroRAT, a campaign that had been running throughout 2020 targeting cryptocurrency users. Top 10 In-the-Wild macOS Malware Discoveries 2021 Let’s take a look at what was unique for each one and the main points that defenders need to be aware of. In 2021 to-date, there have been ten new reported malware discoveries.
#Malware used runonly applescripts to five mac
At the end of the post, we draw out the main lessons Mac admins and security teams can learn from this year’s crop of macOS malware to help them better protect their Mac fleets going into 2022. On top of that, you’ll find a breakdown of the essential behavior of each threat and links to deeper technical analyses. In particular, we hone in on what is unique about each malware discovery, who it targets and what its objectives are. As we approach the end of 2021, we take a look at the year’s main malware discoveries targeting the macOS platform with an emphasis on highlighting the changing tactics, techniques and procedures being employed by threat actors.
