![]() Then we analyzed Mask, a sophisticated malware that was used for cyber espionage. ![]() After that, we played with KitM, which is spyware, and LaoShu, a RAT. ![]() To start off with, we reviewed Flashback, one of the most infamous pieces of OS X malware that reminded everyone to the fact that OS X is not immune to malware. Although our primary objective was to capture network traffic from the malware samples, we were also interested in other aspects of the malware like persistence mechanisms (if any) that they utilized, so we documented that activity as well. We collected a few samples of malware named in that report, along with some samples of other notable OSX malware, with the intention of learning more about them and fill in any gaps in our detection mechanisms (NIDS and Correlation rules). As reported by the team at Bit9+Carbon Black, 2015 marked “the most prolific year in history for OS X malware”. A couple of months ago, as we rang in 2016, we thought it would be interesting to take a quick look back at some OSX malware from 20.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |