VB2014 paper: Methods of malware persistence on Mac OS X


‘KnockKnock’ tool made available to the public.


Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Methods of malware persistence on Mac OS X’ by Synack researcher Patrick Wardle.

It has been a while since

Apple

used the scarcity of

Mac

viruses as part of its marketing strategy. Malware targeting

OS X

is fairly common these days, and it is likely to be here to stay.



In his presentation (which we

previewed

on our blog two months ago), Patrick Wardle showed various ways in which

Mac

malware manages to persist on a machine it has infected, thus making sure it runs even after a reboot. He also showed how many recent families of

OS X

malware maintained persistence.

Patrick also demonstrated the

KnockKnock

tool he has created – and made available for free. The tool, which can easily be extended using plug-ins, allows anyone to see persistent binaries that are to be executed automatically at each boot.



You can read Patrick’s paper

here

in HTML-format, or download it

here

as a PDF (no registration or subscription required). You can download the presentation slides

here

. We have also uploaded the presentation to our YouTube channel.

Later this week, we will publish a new paper by Patrick in which he looks at a recently discovered

OS X

malware family.



Posted on 24 October 2014 by

Martijn Grooten


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *