Microsoft warns that the powerful XCSSET macOS malware is back with new tricks

Rirere

Ars Centurion
311
Subscriptor++
I've often maintained that one thing pushing society to its breaking point is the fact that the world has become too complex for any reasonable human being to even hope to truly understand.

This is a great example. Think of any application that might so much as sneeze near sensitive data (be it on your phone, a laptop, etc.), and ask yourself if you're fully vetted everything down to the source code level...of every dependency and crosslinked library...and then remember that you must also know the providence of every bit of code you've ever used to build something locally, download and install something from the web, and so on.

Even for a "simple" thing like an email app, the web of trust required to "know" that your communications are being securely handled is beyond mindboggling. It's small wonder that most people just give up altogether on trying to keep track of all of this. For most of us, safety comes through probability, not rigor-- and the best we can do on both fronts is often illusory at best.
 
Upvote
116 (116 / 0)
Post content hidden for low score. Show…

adespoton

Ars Legatus Legionis
10,690
One new method creates a file named ~/.zshrc_aliases that contains the malicious payload. The new variant then appends a command in the ~/.zshrc file to ensure that the created file is launched every time a new shell session is initiated. The other new method creates a fake Launchpad app and replaces the legitimate Launchpad path entry with the path for the new one.
Hah! My curmudgeonness is vindicated! I still use bash, so the .zshrc trick won't work, and I refuse to use Launchpad, instead just using an alias to the Applications folder, so I'd never see the second one.
 
Upvote
48 (48 / 0)
Post content hidden for low score. Show…

mert

Ars Tribunus Militum
2,084
Subscriptor
Hah! My curmudgeonness is vindicated! I still use bash, so the .zshrc trick won't work, and I refuse to use Launchpad, instead just using an alias to the Applications folder, so I'd never see the second one.

I see your curmudgeonness and raise you. tcsh for the win!
 
Upvote
23 (24 / -1)
Post content hidden for low score. Show…
I've often maintained that one thing pushing society to its breaking point is the fact that the world has become too complex for any reasonable human being to even hope to truly understand.
Dilbert %22Functionally Stupid%22 8-18-1996.jpg
 
Upvote
21 (26 / -5)

ryanr

Ars Centurion
216
Subscriptor
Does this mean reverting to use bash as default over zshell is safer?
No. .zshrc_aliases is just another file, it has no special meaning to zsh, it's just a file with an innocuous name that someone might expect to be sourced from .zshrc. It could just as well be sourced from .bashrc, or called .bashrc_aliases.

Edit: It means it's safer to keep your dot files in source control and be suspicious it they change without you explicitly editing them.
 
Upvote
-2 (1 / -3)

zogus

Ars Tribunus Angusticlavius
7,178
Subscriptor
Does this mean reverting to use bash as default over zshell is safer?
For this particular attack, that seems to be the case, but not because there‘s anything inherently superior about bash. The perps could have trivially victimized bash users by similarly modifying ~/.bashrc after breaking in; they just didn’t bother.
 
Upvote
6 (6 / 0)
A scenario where XProtect should protect, right?

Any news from Apple on this?
The referenced post in the article states some of the binaries associated with this malware are signed, so it’s only a matter of time before Apple revokes and blocks and XProtect does its job - though there’s always a higher risk on dev systems that some macOS security protections might be disabled.
 
Upvote
5 (5 / 0)

zogus

Ars Tribunus Angusticlavius
7,178
Subscriptor
WHO, exactly, is this article for? I mean, all this tech mumbo-jumbo is impressive but I'm not a techie or coder. I don't even know what a "zero-day" is (and is not explained).
The first paragraph makes it clear that the malware targets app developers. In other words, if you aren’t an app developer on macOS, you could have stopped reading the “mumbo-jumbo” right there. If you are an app developer and don’t know what a zero-day is…well, this would be a good time to start doing some outside reading.
 
Upvote
5 (5 / 0)

Lorentz of Suburbia

Ars Praetorian
588
Subscriptor
Ooh! Ooh! Do the "Macs don't get viruses" bit next!
Eeep! Eeep! Do the "Do the Macs don't get viruses bit" < bananas > < feces > < neckbeard > bits next.

When a person accepts a great hourly rate to develop for and admin Microsoft systems by day, they sleep at night because their personal compute is not on Microsoft.

I sleep even better when my daytime devops hours don't include MS at all.

But hey, you play the cliches that make you feel better. Don't mind me.
 
Upvote
2 (4 / -2)