Out of all the versatile sorts of Internet advertising and promotion, the authors of MacGlobalDeals app for Mac OS X chose an unwelcome path based on highly intrusive techniques. The way it works involves trespassing of the malicious code on the user’s machine via obscure drive-by tricks, and then installing a browser extension which deploys a noxious ad placement activity regardless of the victim’s discretion. This post reflects in-depth dissection of this Mac adware and provides effective removal instructions.
The adware referred to as Offers4U compromises both Windows and Mac users. The foremost reason why its impact is irritating is because the visited websites get third-party components embedded in their layout without transparent user authorization preceding these occurrences. Usually brought with other software that doesn’t appear to be related, this infection causes distress, web browsing disruption and possibly privacy issues.
A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 4 - Integrity Checkup with System Virginity Verifier
The Team T5 guys, TT (Sung-ting Tsai) and Nanika (Ming-chieh Pan), end their Black Hat presentation with the description of a trick to gain root permission on Mac OS X. Also, the experts provide the main takeaways that should be drawn from their research and introduce the System Virginity Verifier for Mac OS X (SVV-X) tool intended for comprehensive Mac integrity checkup.
This part of the Black Hat presentation by representatives of the Team T5 Research is dedicated to nuances of host privilege on Mac OS X and what can be done with it. In particular, the ways of granting such permissions to a normal user are highlighted. Additionally, the experts describe a method for bypassing the kernel module verification and show the process of loading kernel module in a demo.
Taiwanese researcher Sung-ting Tsai, aka TT, now delves deeper into the ins and outs of process hiding on Mac OS X, in particular through the use of the Rubilyn rootkit. The flip side of the coin, that is, detecting a process that had been hidden, is analyzed as well to show how user mode can be helpful in this context. For the purpose of visualization, there are demos demonstrating these tricks in action.
During their presentation at Black Hat Asia 2014, researchers from Team T5 Sung-ting Tsai and Ming-chieh Pan demonstrate some tricks for advanced process hiding in Mac OS X. In essence, this is activity powered by a rootkit, such as Rubilyn, which can make an arbitrary process not visible in the standard way. TT and Nanika also highlight methods for direct kernel task access and gaining root permission.