macOS malware used run-only AppleScripts to avoid detection

macOS malware used run-only AppleScripts to avoid detection for five years


Nested run-only AppleScripts, for the win!
But the cryptominer did not go entirely unnoticed. SentinelOne said that two Chinese security firms spotted and analyzed older versions of the OSAMiner in August and September 2018, respectively.
But their reports only scratched the surface of what OSAMiner was capable of, SentinelOne macOS malware researcher Phil Stokes said yesterday.
The primary reason was that security researchers weren't able to retrieve the malware's entire code at the time, which used nested run-only AppleScript files to retrieve its malicious code across different stages.
As users installed the pirated software, the boobytrapped installers would download and run a run-only AppleScript, which would download and run a second run-only AppleScript, and then another final third run-only AppleScript.

Related Keywords

China , Chinese , Chineses Asia Pacific , Bundo Kim , Microsoft Office For Mac , Microsoft Office , Phil Stokes , சீனா , சீன , சினெஸ்ஸ் ஆசியா பெஸிஃபிக் , மைக்ரோசாஃப்ட் அலுவலகம் க்கு மேக் , மைக்ரோசாஃப்ட் அலுவலகம் , பில் ஸ்டோக்ஸ் ,

© 2025 Vimarsana