![]() ![]() jpg refers to the screenshot of the current desktop a new screenshot is taken approximately every minute and the filename for the screenshot changed in increments of one. Note that the symbol ~ indicates the current user.domain refers to the file containing the target command and control (C&C) server address.report refers to the file containing the file path and app bundle dropped its use will be discussed in the next section. Reference to hidden contents In our testing, executing the Mach-O xcassets shows that it drops the following files in the folder ~/Library/Caches/GameKit/. Once the project is built and compiled, we suspect that the malicious code is executed. Hidden contents of project In one of the project files (.pbxproj), a reference to Assets.xcassets was found. Assets.xcassets shell script to call the Mach-O malware Figure 3. The hidden folder contains the following: 1. Modified workdata string We were able to identify a hidden folder located in one of the.xcodeproj files for the project. For this incident, we initially traced an infected project s Xcode work data files and found that a reference to another folder was listed instead of to the main folder this workspace has. Inside the project, schema files that contain how each part is mapped are also generated. A sample Xcode project and its contentsģ When creating a project in Xcode, a project file (.xcodeproj) is generated that contains the code and resources to be built together. Since its release, plenty of developers have used Xcode for their Apple software needs. Initial Entry Xcode is an integrated development environment (IDE) used in macos for developing Apple-related software and is available for free from the Mac AppStore. In this technical brief, we will discuss our investigation into this attack which includes the hidden Mach-o executable, its Applescript payload functions along with the three zero-day exploits we discovered, and the JS payloads it injects to exfiltrate and manipulate data from browsers. We have also identified this threat in other sources including VirusTotal and Github, which indicates this threat is at large. The threat escalates when affected developers share their projects via platforms such as GitHub, leading to a supply-chain-like attack for users who rely on these repositories as dependencies in their own projects. This poses a risk for Xcode developers in particular. This scenario is quite unusual in this case, malicious code is injected into local Xcode projects so that when the project is built, the malicious code is run. The malware has the capability to hijack Safari and inject various Javascript payloads. Most notably, we found two zero-day exploits: one is used to steal cookies via a flaw in the behavior of Data Vaults another is used to abuse the development version of Safari. Upon further investigation, we learned that a developer s Xcode project at large contained the source malware which leads to a rabbit hole of malicious payloads. 2 Introduction We have discovered an unusual infection related to Xcode developer projects.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |