Security Market Segment LS
Friday, 12 April 2019 10:37

Attackers using Mono to run Windows malware on macOS: claim

Attackers using Mono to run Windows malware on macOS: claim Image by Eduardo Taboada from Pixabay

The Mono framework, a free system that lets users run Windows applications on other operating systems, including macOS, is allowing malicious attackers to infect Apple systems with Windows malware.

Mono was developed by Miguel de Icaza, a co-founder of the GNOME desktop project, a DE that is used by Linux systems. De Icaza is now employed by Microsoft.

The security firm Kaspersky Lab pointed out that malicious attackers were collecting data about Apple systems and feeding it into adware using files with an .exe extension – files which normally run only on Windows.

To add to the irony, this was done with pirated copies of the Little Snitch firewall and users who tried to avoid paying for a licence ended up with malware instead, researcher Leonid Grustniy said.

"The infected version of the firewall was distributed using torrents. Victims downloaded to their computers a ZIP archive with a disk image in DMG format — so far, normal.

"But a close look at the contents of this DMG file reveals the presence of the MonoBundle folder with a certain installer.exe inside. This is not a typical macOS object; EXE files usually just don’t run on Mac machines."

Grustniy pointed out that Windows executables were unsupported by macOS to the extent that the Gatekeeper security feature in macOS simply ignored .exe files.

"As you can probably guess, the Mono framework is what the cyber criminals exploited," Grustniy said. "A framework usually needs to be installed on the computer separately, but these cyber crooks came up with a method of packaging it with the malware (remember the sinister EXE in the MonoBundle folder?). As a result, the malware runs successfully even on Macs whose owners use only native programs."

When installed, the malware collected information about the host system and sent this, along with data about the installed applications, to its command and control server.

"Simultaneously, it downloads several more images to the infected computer with installers masked as Adobe Flash Media Player, or Little Snitch. They are in fact run-of-the-mill adware tools that pester you with banners," said Grustniy.


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments