A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 4 - Integrity Checkup with System Virginity Verifier
The Team T5 guys, TT (Sung-ting Tsai) and Nanika (Ming-chieh Pan), end their Black Hat presentation with the description of a trick to gain root permission on Mac OS X. Also, the experts provide the main takeaways that should be drawn from their research and introduce the System Virginity Verifier for Mac OS X (SVV-X) tool intended for comprehensive Mac integrity checkup.
This part of the Black Hat presentation by representatives of the Team T5 Research is dedicated to nuances of host privilege on Mac OS X and what can be done with it. In particular, the ways of granting such permissions to a normal user are highlighted. Additionally, the experts describe a method for bypassing the kernel module verification and show the process of loading kernel module in a demo.
Taiwanese researcher Sung-ting Tsai, aka TT, now delves deeper into the ins and outs of process hiding on Mac OS X, in particular through the use of the Rubilyn rootkit. The flip side of the coin, that is, detecting a process that had been hidden, is analyzed as well to show how user mode can be helpful in this context. For the purpose of visualization, there are demos demonstrating these tricks in action.
During their presentation at Black Hat Asia 2014, researchers from Team T5 Sung-ting Tsai and Ming-chieh Pan demonstrate some tricks for advanced process hiding in Mac OS X. In essence, this is activity powered by a rootkit, such as Rubilyn, which can make an arbitrary process not visible in the standard way. TT and Nanika also highlight methods for direct kernel task access and gaining root permission.
The Flipora service hosted at static.flipora.com is an old timer in the shady web environment. Whereas there seems to be a bunch of effort put into it by whoever is in charge, this provider applies a tactic of aggressive user involvement, with shades of misinformation in place as well. This tutorial of ours is going to highlight the main adware injection techniques used in this campaign, and will provide a fix for this security problem.
Mac users have been finding themselves in the uncomforting situation of MacSmart ads popping up on random websites. This is in fact an adware problem because the administrators of visited sites have nothing to do with the sponsored content. Instead, a hard-to-remove browser add-on compatible Safari, Chrome and Firefox generates the advertisements and price comparisons. Since this issue has a distinct malicious coloring, it has been thoroughly analyzed by the MacSecurity team and is fully described in this article, with clear removal steps provided as well.