VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle

Posted by   Martijn Grooten on   Apr 28, 2017

Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers' attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client.

In a VB2016 last-minute presentation, ESET researchers Peter Kalnai and Martin Jirkal took a careful look at both instances. They also explained how they used the Volatility Framework to analyse the malware, and to create a plug-in to detect IoCs on memory dumps of compromised systems.

 

keyranger_ransomnote.png

 

The video of Peter and Martin's presentation is now available to watch on our growing YouTube channel – where, incidentally, you'll also find a video from IBM researcher Martin Korman who, a year earlier, presented a paper on using Volatility to extract binaries from malware samples.

If you're interested in OS X malware, make sure you join us at VB2017 where Patrick Wardle (Synack) will discuss how to analyse such malware with a custom C&C server, while Tiberius Axinte (Bitdefender) will discuss the OS X component of APT28's XAgent. Peter Kalnai will be on the programme as well: together with his colleague Michal Poslusny, he will present a paper on how banking trojans make use of web browsers.

Registration for VB2017 is now open - register before 30 June 2017 to qualify for the early bird rate!

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2020 localhost call for last-minute papers now open!

The call for last-minute papers for VB2020 localhost is now open. Submit before 17 August to have your paper considered for one of the nine slots reserved for 'hot' research!

Announcing... VB2020 localhost

Announcing VB2020 localhost: the carbon neutral, budget neutral VB conference!

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their…

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request…

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.