New digitally signed Mac malware confuses users with right-to-left file name tricks

The malware is digitally signed and is probably used in targeted attacks, researchers from F-Secure said

A new piece of digitally signed spyware for Mac OS X uses a special Unicode character in its file name to hide its real file extension from users and trick them into installing it.

The malware, which has been dubbed Janicab.A, is written in Python and is packaged as a stand-alone Mac application using the py2app utility, researchers from security firm F-Secure said Monday in a blog post.

It is distributed as a file called "RecentNews.?fdp.app" where the "?" is actually the right-to-left override (RLO) character known as U+202E in the Unicode encoding standard.

Unicode supports characters from most languages, including those written from right to left like Arabic and Hebrew. The special RLO character tells software that the text following it should be displayed from right to left.

Apple displays double extensions for security reasons in the Mac OS X file manager, said Sean Sullivan, a security advisor at F-Secure, Tuesday via email. "Here, the RLO trick is being used to counter that and to make the .app appear to be a .pdf."

The trick itself is not new and has been used by Windows malware in the past, including by the Bredolab email spam malware and the Mahdi cyberespionage Trojan program that targeted computers in the Middle East.

Opening the Janicab .app file will trigger a standard Mac OS X pop-up dialog warning the user that the file was downloaded from the Internet. However, because of the RLO character in the file name, the entire warning text will be written right to left making it confusing and hard to read.

If users agree to open the file, the malware will install itself in a hidden folder in the user's home directory and will open a decoy PDF document containing what appears to be a news article in Russian.

Janicab continuously takes screenshots and records audio and uploads the collected data to command and control (C&C) servers that it finds by parsing the description of specific YouTube videos. It also queries the C&C servers for commands to execute, the F-Secure researchers said in the blog post.

Based on statistics for the YouTube videos whose descriptions are parsed by the malware, the malware's functionality and the contents of the decoy document, F-Secure researchers believe the malware is being used in targeted attacks, Sullivan said. However, the company doesn't have any information about the identity of the targets, he said.

Janicab samples were uploaded to the VirusTotal malware scanning service from five countries, but that information might reflect the locations of different security researchers, not victims, Sullivan said.

The malware's installer is digitally signed with a code-signing certificate -- an Apple Developer ID -- issued by Apple to a person named "Gladys Brady."

In May, security researchers found several samples of a Mac OS X backdoor-type program called KitM or HackBack, that were digitally signed with a valid Apple Developer ID issued to "Rajinder Kumar." One of those samples was collected from the Mac laptop of an Angolan activist attending the Oslo Freedom Forum, a human rights conference in Norway.

Researchers linked the KitM samples to a larger cyberespionage campaign of Indian origin dubbed Operation Hangover.

F-Secure reported the new certificate being abused by the Janicab malware to Apple, but has yet to receive confirmation of any action taken by the company, Sullivan said. "They quickly revoked the certificate in the previous KitM case," he said. "I have no doubt they'll also revoke this developer [ID] soon if they haven't already."

The F-Secure researchers believe that Apple is likely to create a removal tool for Janicab as it did for the "Pintsized" Mac OS X malware discovered in February.

"As the popularity of OS X continues to grow, Apple users have to get used to the fact that they will become targets for malware authors," said Gavin Millard, EMEA technical director at security firm Tripwire, via email. "Although the RLO (Right Left Override) approach of obfuscating the true extension of a file is simple to spot, users will still click, especially as they are not used to being targeted."

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags AppleMac OSTripwiresecuritysoftwaref-secureoperating systemsspywaremalware

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?