APPLE

Security bite: this is what malware for your Mac can detect and remove it on its own

Have you ever wondered what malicious programs can detect and delete without the help of third-party software? Apple continuously adds new rules for detecting harmful programs to the built -in Suite Mac. While most of the names of the rules (signatures) are confused, with a small number of reverse engineer, security researchers can compose them with their common names of the industry. Here, what harmful software, your Mac can detect and remove it independently:

9to5MAC, the security bite exclusively bring you mosyle, & nbsp; The only Unified Platform Apple Unified field creation of apple devices is ready to work, and Enterprise is all that we do. Our unique integrated approach to management and security combines modern Apple safety solutions for complete automatic strengthening & amp; Correspondence, EDR Next Generation, AI-Powered Zero Trust and exclusive privilege management with the most powerful and modern Apple MDM in the market. The result is a fully automated Apple Unified Platform, which is currently entrusted with more than 45,000 organizations to make millions of Apple devices ready to work without effort and at affordable cost. Request your expanded test Today and understand why Mosyle is everything you need to work with Apple. Every week, Arina Vachulis gives an idea of ​​data confidentiality, reveals vulnerabilities and sheds light on the arising threats in the extensive Apple ecosystem of more than 2 billion active devices. ✌

XPROTECT, right?

XPROTECT was introduced in 2009 as part of MacOS X 10.6 Snow Leopard. Initially, it was released to detect and prevent users if malicious software was found in the installed file. However, XPROTECT has recently developed significantly. The retirement of a long -standing tool for removing malware (MRT) in April 2022 caused the appearance of XPROTECTREMEDITOR (XPR), more capable of a native anti -bearing component responsible for the detection and correction of threats on the MAC. Yara itself is a widely accepted open source tool that identifies files (including malicious software) based on specific characteristics and templates in the code or metadata. The fact that in the Yara rules is so great is any organization or person to create and use your own, including Apple. Could detect malicious software, using the Yara rules whenever the application first launches, changes or updates its signatures. They are found in the background during periods of low activity and have a minimal effect on the processor. Although this is done for a good reason, this makes difficulties for those who are curious to know exactly what can identify the malicious XPROTECT programs.

For example, some Yara rules are given more obvious names, such as XPROTECT_MACOS_PIRIT_GEN, a signature for detecting the Pirrit advertising support. However, in the XPROTECT, you are largely more generally general, such as XPROTECT_MACOS_2FC5997, and internal signatures that only Apple engineers know, such as XPROTECT_SNOWDRIFT. It is here that security researchers, such as Phil Stawks and Olden, appear. Moreover, Alden recently achieved significant achievements in understanding how XPR works, extracting the Yara rules from its binary scanning module files.

How can I find XPROTECT on my Mac? It also works at the system level, completely in the background, so the intervention is not required. Updates to XPROTECT also occur automatically. Here, where it is located:

  1. in macintosh hd , go to the library & gt; Apple & GT; System & gt; Library & GT; Coreservices
  2. from here, you can find remediators by right-clicking on xprotect
  3. then click show package Contents
  4. expand concentes
  5. open macos
  6. Note. Users should not fully rely on Apple, as was done to detect known threats. More advanced or complex attacks can easily bypass detection. I highly recommend using third -party detection and deletion tools. Scanning modules XPR 8217; For removal. Currently, we can identify 14 of 24 corrections in the current version of XPR (V151) to prevent malicious software and Bundleware Loader, aimed at MacOS users since 2017. Adload was able to avoid detection to the last update in the last past.

  7. Bluetop: “ Bluetop, apparently, is the Trojan-Proxy campaign, which was covered with Kaspersky at the end of 2023, ” says Alden. Bundlore is a family of common advertising drops that are aimed at MacOS systems. Many third -party malware scanners can detect the Bundlor and stay in real time in it. This is not a significant threat.
  8. cardboardCutout: This module works a little differently than others. Instead of scanning for a specific type of harmful programs, CardboardCutoutout acts, creating a “neckline” of malicious programs with well -known signatures and stops it before it gets the opportunity to work in the system. It was also associated with 3CX violations and exchanges of the features of both Linux and Windows options. ” Simpletea (Simplextea on Linux) is a Trojan with remote access (rat), which is believed to arise from CNPR. This is a malicious campaign discovered in February 2024, which on the scale infects MacOS users on a scale, potentially with the aim of creating a MacOS botnet or delivering other malicious programs on a scale, ” States Phil Stokes for Sentinel One.
  9. Dubrobber: Alarming and universal Trojan droppers, also known as Xcsset.
  10. eicar : a harmless file that is deliberately designed to launch antivirus scanners without harm. Unwanted program (puppy). So much so that he even has his own Wikipedia page.
  11. MRTV3: This is a collection of components of detecting and removing the malware given in XPROTECT from its predecessor, a tool for removing harmful programs (MRT).
  12. pirit: This one is also not disguised for any reason. Pirrit is the MacOS advertising program that first appeared in & nbsp; 2016. It is known that he enters pop-up ads to the web pages, collect private users data and even manipulate the search rating for user redirecting to malicious pages. Says Oldden. 3CX was an attack by the supply chain associated with the Lazarus group. Researchers.
  13. sheepswap : not yet identified.
  14. showbeagle: not yet identified.
  15. trovi : Similarly, Pirit, Trovi is one browser cross-platform. It is known that he was known for redirecting the results of the search, the story of viewing tracking and introduces his own ads into the search.
  16. Waternet: has not yet been identified. If you have advice that some of the modules are not identified yet, please leave it in the comments or send me an email letter to [email protected].

Leave a Reply