Researchers Explore Remote Code Injection in macOS

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,166
Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory.

Malware authors often use code injection to hide activity and bypass security defenses. There are several ways to implement code injection techniques, which run malicious code through unsuspected or legitimate system processes. Malware writes part of the code in a remote process' memory, which executes malicious code not part of the process' original execution flow.

Code injection methods are a hot topic among security researchers; however, much of their work focuses on the Windows operating system given its ubiquity among consumer and business users. However, as macOS grows more common, Deep Instinct decided to pivot its code injection research toward Apple machines. In a new paper published today, security researcher Alon Weinberg digs into their discoveries.

"MacOS is becoming more popular, specifically in the United States," says Shimon Oren, head of threat research at Deep Instinct, in an exclusive interview with Dark Reading.

There is also an impression macOS is more secure than Windows or Android, he continues. While it's true that Apple's operating systems are less susceptible to malware using code injection, they are not immune to it. As Weinberg found, it's still possible for Mac devices to get infected by code execution techniques using remote process hooking. Further, when the malware hits, it's likely to go undetected: the techniques he analyzed bypass several popular security tools for macOS.

"Right now if an attacker wants to use these mechanisms, there is no solution in the marketplace that can protect against it," Oren says. Researchers tested code injection methods across a range of freeware and enterprise solutions for Mac; a handful of tactics evaded all of them.
Even on the Apple of Your Eye: Remote Code Injections in Mac-OS - Deep Instinct
 

ebocious

Level 5
Verified
Well-known
Oct 25, 2018
232
There are plenty of default-deny solutions for Windows, both free and paid. Now we need some for the Mac.
 

JM Safe

Level 39
Verified
Top Poster
Apr 12, 2015
2,882
Every operating system could be vulnerable, in this case we talk about macOS but also others OS that could be though as 100 % safe are vulnerable to malicious activities. If we think for example to Chromebook surely it has a lot of security features (it has a layered in-depth security approach), but it is not 100 % safe and it will never be, this is because a user could click on a fake website which has deceptive content and which is missed by browser filters and insert all his/her personal information on forms and those information could be sent to a malicious remote server and the user could be phished.
It is very important to have safe habits and take security measures to safely browsing the web.
 
  • Like
Reactions: harlan4096

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top