First Mac OS X fake installer pops up, racks up your mobe bill

Russian music app? Nope, it's an SMS trojan


Crooks have developed a new Mac OS X-specific Trojan that mimics the behaviour of a legitimate software installer.

Trojan-SMSSend-3666, which poses as an application for listening to music on a popular Russian social networking site, attempts to hoodwink marks into handing their mobile number to activate the radio app. Users are asked to enter their phone number into an appropriate field and then specify the code sent to the mobile in an SMS.

In the process victims are charged for a premium-rate text message and sign themselves up for regular debits. In return, they get nothing beyond an application that can be downloaded for free from elsewhere on the net, at best.

"The malicious scheme used to spread this Trojan is notorious among many Windows users but until now it hasn't been employed to deceive owners of Macs," notes Russian antivirus firm Dr Web.

Trojan-SMSSend-3666 was built using "affiliate programme" ZipMonster, which helps fraudsters craft fake installers and assists in collecting payments for the distributors of the malware. Crooks have been encouraged to migrate from cooking up fake Windows installers to creating fraudulent Mac OS X apps, in this case a fake VKMusic 4 for Mac OS X set-up utility.

Dr Web has a full write-up of the threat, including screenshots, in a blog post here. The Next Web notes that Apple has updated its virus definition files to block the scam.

This won't, of course, prevent possible future variants of the malware emerging, which may appear under a slightly different guise. The days of Windows-only desktop malware are long over, certainly since the appearance of the Flashback Trojan this year. If you're an Apple Mac OS X user on the web, caution is advised.

Fake installer scams have already been seen in the field of smartphone malware. Some notable cases of premium service abusers include malicious versions of Bad Piggies and Adobe Flash Player for Android, Trend Micro reports. ®

Similar topics

Broader topics


Other stories you might like

  • Emotet malware gang re-emerges with Chrome-based credit card heistware
    Crimeware groups are re-inventing themselves

    The criminals behind the Emotet botnet – which rose to fame as a banking trojan before evolving into spamming and malware delivery – are now using it to target credit card information stored in the Chrome web browser.

    Once the data – including the user's name, the card's numbers and expiration information – is exfiltrated, the malware will send it to command-and-control (C2) servers that are different than the one that the card stealer module uses, according to researchers with cybersecurity vendor Proofpoint's Threat Insight team.

    The new card information module is the latest illustration of Emotet's Lazarus-like return. It's been more than a year since Europol and law enforcement from countries including the United States, the UK and Ukraine tore down the Emotet actors' infrastructure in January 2021 and – they hoped – put the malware threat to rest.

    Continue reading
  • Symbiote Linux malware spotted – and infections are 'very hard to detect'
    Performing live forensics on hijacked machine may not turn anything up, warn researchers

    Intezer security researcher Joakim Kennedy and the BlackBerry Threat Research and Intelligence Team have analyzed an unusual piece of Linux malware they say is unlike most seen before - it isn't a standalone executable file.

    Dubbed Symbiote, the badware instead hijacks the environment variable (LD_PRELOAD) the dynamic linker uses to load a shared object library and soon infects every single running process.

    The Intezer/BlackBerry team discovered Symbiote in November 2021, and said it appeared to have been written to target financial institutions in Latin America. Analysis of the Symbiote malware and its behavior suggest it may have been developed in Brazil. 

    Continue reading
  • HelloXD ransomware bulked up with better encryption, nastier payload
    Russian-based group doubles the extortion by exfiltrating the corporate data before encrypting it.

    Windows and Linux systems are coming under attack by new variants of the HelloXD ransomware that includes stronger encryption, improved obfuscation and an additional payload that enables threat groups to modify compromised systems, exfiltrate files and execute commands.

    The new capabilities make the ransomware, first detected in November 2021 - and the developer behind it even more dangerous - according to researchers with Palo Alto Networks' Unit 42 threat intelligence group. Unit 42 said the HelloXD ransomware family is in its initial stages but it's working to track down the author.

    "While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k," the researchers wrote in a blog post.

    Continue reading

Biting the hand that feeds IT © 1998–2022