VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle

Posted by   Martijn Grooten on   Apr 28, 2017

Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers' attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client.

In a VB2016 last-minute presentation, ESET researchers Peter Kalnai and Martin Jirkal took a careful look at both instances. They also explained how they used the Volatility Framework to analyse the malware, and to create a plug-in to detect IoCs on memory dumps of compromised systems.

 

keyranger_ransomnote.png

 

The video of Peter and Martin's presentation is now available to watch on our growing YouTube channel – where, incidentally, you'll also find a video from IBM researcher Martin Korman who, a year earlier, presented a paper on using Volatility to extract binaries from malware samples.

If you're interested in OS X malware, make sure you join us at VB2017 where Patrick Wardle (Synack) will discuss how to analyse such malware with a custom C&C server, while Tiberius Axinte (Bitdefender) will discuss the OS X component of APT28's XAgent. Peter Kalnai will be on the programme as well: together with his colleague Michal Poslusny, he will present a paper on how banking trojans make use of web browsers.

Registration for VB2017 is now open - register before 30 June 2017 to qualify for the early bird rate!

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.