Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Source Code of $3k-a-Month macOS Malware 'Banshee Stealer' Leaked (securityweek.com)
46 points by sandwichsphinx on Nov 30, 2024 | hide | past | favorite | 7 comments


So let me get this straight. The malware source code was uploaded to github for people to view, but it's all in zip and 7z files, requiring you to download and execute the files in order to see their contents. 7z itself just had a RCE cve last week, and who would ever download malware files and unzip them trying to view the source code. This repo is not something to be trusted in its current state

https://github.com/vxunderground/MalwareSourceCode/tree/main...


When your threat model includes distrust of your tools, you can run your tools in a vm then exfiltrate the files from there. perhaps even fingerprint the whole vm to analyze if there were shenanigans afoot in the archive. If your threat model also includes distrust of your vm, which is reasonable, vm's are not the security panacea some try to sell them as. Then yeah, stay away from it. or start investing in throwaway one use machines and depend on the network isolation keeping you safe.


Seems very basic looking at the source. The real value is in binary obfuscation I suppose, if that's even needed when mcOS doesn't use any sort of "antivirus".


macOS does have a built-in antivirus, XProtect: https://support.apple.com/guide/security/protecting-against-...


Apple has the means to stop random unsigned binaries from running with out intense user intervention, so I wouldn't say there isn't any.


IIUC this is based on a pretty simple fingerprint of the executable. So a motivated attacker can produce different builds that break the signature resulting in each build being "new" and being allowed by default.

This is different than the "notarization" process which requires uploading the executable and Apple has a change of better identifying variants. I don't think notarization is yet required or done on unknown executables by default. (In fact I think they need to be signed to be notarized.)


Unless you change the default settings to allow untrusted apps, code that isn't notarized won't be allowed to run

https://support.apple.com/guide/security/gatekeeper-and-runt...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: