Malware Cuckoo – Previously Unknown Infosteler Spyware Steals Data From MacOS

by Esmeralda McKenzie
Malware Cuckoo – Previously Unknown Infosteler Spyware Steals Data From MacOS

Malware Cuckoo – Previously Unknown Infosteler Spyware Steals Data From MacOS

Malware Cuckoo –  Beforehand Unknown Infosteler Adware Steals Data From MacOS

Security researchers have uncovered a beforehand undetected malware threat for macOS that presentations characteristics of each an infostealer and spyware and spyware. Dubbed “Cuckoo” after the brood parasitic hen, this malicious code infiltrates systems and steals resources for its gain attain.

The malware became as soon as first observed on April 24th, 2024 in a Mach-O binary file disguised as “DumpMediaSpotifyMusicConverter” – an application that claims to rework song from Spotify to MP3 structure. Prognosis presentations Cuckoo is a universal binary in a position to running on each Intel and ARM-primarily based Macs.

EHA

Screenshot%202024 05 01%20at%2011.33.15%E2%80%AFAM
Malware Cuckoo - Previously Unknown Infosteler Spyware Steals Data From MacOS 11

Cuckoo’s Infiltration Ways

The malware is delivered thru a disk image (DMG) file downloaded from the dumpmedia[.]com net pickle. As soon as installed, it performs a series of assessments to e-book clear of detection and resolve if the infected draw is a viable aim.

Kandji’s researchers realized that Cuckoo queries the draw’s universally irregular identifier (UUID) and assessments the machine’s locale settings. It namely looks for systems positioned in Armenia, Belarus, Kazakhstan, Russia, and Ukraine – fending off infection on machines from those regions.

Cuckoo initiates its files exfiltration and surveillance routines if deemed a viable aim. It’s programmed to take a broad vary of sensitive files alongside side:

  • Keychain files containing passwords and cryptographic keys
  • Display camouflage captures and webcam snapshots
  • Browsing history and cookies
  • Messaging app files cherish WhatsApp and Telegram logs
  • Cryptocurrency pockets shrimp print
  • SSH keys and other authentication credentials

The stolen files is then exfiltrated to a state-and-control server controlled by the malware operators.

To address up a power presence, Cuckoo installs a open agent that persists across reboots. It also employs a quantity of evasion systems cherish encrypting community traffic and only running malicious parts if obvious cases are met.

Doc

Integrate ANY.RUN in Your Company for Effective Malware Prognosis

Are you from SOC, Threat Analysis, or DFIR departments? If that is so, you’ll probably be a a part of an on-line neighborhood of 400,000 just security researchers:

  • Precise-time Detection
  • Interactive Malware Prognosis
  • Straightforward to Be taught by Unique Security Crew people
  • Rep detailed experiences with maximum files
  • Predicament Up Virtual Machine in Linux & all Dwelling windows OS Variations
  • Hang interplay with Malware Safely

While you’ll want to always take a look at all these parts now with entirely free entry to the sandbox:

Prevention and Response

Kandji and other security firms have updated their detections to identify and block Cuckoo. Nonetheless, preventing such threats requires a layered protection methodology:

  • Set up tool updated and patched
  • Use genuine anti-malware instruments
  • Set up remote from downloading apps from untrusted sources
  • Enforce endpoint detection and response (EDR) solutions

If infected, organizations must restful provoke incident response procedures – setting apart impacted systems, changing uncovered credentials, and working to put off Cuckoo and each other malware realized.

The invention highlights the increasing sophistication of macOS threats and desire for out of the ordinary security controls, even on desktop platforms. Kandji’s evaluation gives a detailed see at how Cuckoo operates to encourage the cybersecurity neighborhood defend in incompatibility invasive malware cuckoo.

Indicators of Compromise

DMGS

  • Spotify-song-converter.dmg: 254663d6f4968b220795e0742284f9a846f995ba66590d97562e8f19049ffd4b

MACH-OS

  • DumpMediaSpotifyMusicConverter: 1827db474aa94870aafdd63bdc25d61799c2f405ef94e88432e8e212dfa51ac7
  • TuneSoloAppleMusicConverter: d8c3c7eedd41b35a9a30a99727b9e0b47e652b8f601b58e2c20e2a7d30ce14a8
  • TuneFunAppleMusicConverter: 39f1224d7d71100f86651012c87c181a545b0a1606edc49131730f8c5b56bdb7
  • FoneDogToolkitForAndroid: a709dacc4d741926a7f04cad40a22adfc12dd7406f016dd668dd98725686a2dc

DOMAINS/IPS

  • http://146[.]70[.]80[.]123/static[.]php
  • http://146[.]70[.]80[.]123/index[.]php
  • http://tunesolo[.]com
  • http://fonedog[.]com
  • http://tunesfun[.]com
  • http://dumpmedia[.]com
  • http://tunefab[.]com

Source credit : cybersecuritynews.com

Related Posts