Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

'Proton' Mac trojan has Apple code-signing signatures, sold to 'customers' for $50K

Security researchers have discovered the existence of a new trojan dubbed "Proton" being marketed in hacking forums to online criminals, claiming to ship with genuine Apple code-signing signatures that could make it a greater risk to victims.

Found on Russian cybercrime forums, "Proton" is a remote access trojan (RAT) aimed at macOS systems, according to security firm Sixgill. Written in Objective C, allowing it to run without any dependencies, the malware is marketed by the creator as a "professional FUD surveillance and control solution, with which you can do almost everything with (a) target's Mac."

With root-access privileges, the list of potential actions includes keylogging, uploading and downloading files, screenshots, webcam access, and SSH and VNC connectivity. It is also claimed the malware can also present victims with a custom window, which could be used to request extra information, such as a credit card number.

The user's locally-stored data is not the only information at risk, as the researchers note the trojan also grants access to iCloud, even if the user has enabled two-factor authentication.

Sixgill advises the malware's creator managed to get the code signed by Apple, suggesting it has managed to pass through Apple's rigorous filtration process for third-party software developers. It is believed the developer has either falsified their registration to the Apple Developer ID Program or used stolen credentials, in order to get through the signing process.

Furthermore, Sixgill believes the malware is only able to get root privileges by using a "previously unpatched 0-day vulnerability" in macOS, one thought to be in the trojan creator's possession.

Despite its capabilities, the trojan still relies on existing methods to be infected on a target system. Users of Proton still have to disguise the malware with a custom name and icon, and to somehow trick targets into downloading and installing it.

The creator of Proton attempted to market it as a supposedly legitimate security tool, complete with a website advertising it as an ideal solution to prevent corporate espionage, to help administrators manage systems, and for parents to monitor their children's Internet usage. The website was quickly taken down shortly after Sixgill published its report.

Notably, the trojan's creator has cut the price of Proton for their potential "customers." Previously, the tool cost 100 bitcoins ($126,000) to acquire, with a license for unlimited installations, but criticism from others prompted a reduction to 40 bitcoins ($50,400) for unlimited installations, or 2 bitcoins ($2,512) for a single installation.

Proton is the latest in a recent string of malware discoveries targeting Macs, a platform considered to be more robust against attacks compared to Windows and other operating systems. In February, malware called "MacDownloader" was discovered as part of an attempt to hack individuals and companies in the U.S. defense industry, and human rights advocates, by posing as a Flash Player update.

In the same month, malware employing an auto-running macro in a Word document surfaced, using an old technique previously used to infect Windows systems. Later in February, a Russian hacking group accused of interfering with the 2016 U.S. presidential elections was found to have updated its "Xagent" malware package, expanding its reach from Windows, iOS, Android, and Linux devices to attack Macs.



13 Comments

☕️
r00fus1 8 Years · 65 comments

So when is Apple going to revoke the cert? I mean that's why code signing is a requirement, right?

☕️
sockrolid 14 Years · 2789 comments

In February, malware called "MacDownloader" was discovered as part of an attempt to hack individuals and companies in the U.S. defense industry, and human rights advocates, by posing as a Flash Player update.

Flash Player *is* malware.
Isn't it?

🌟
ktappe 16 Years · 824 comments

r00fus1 said:
So when is Apple going to revoke the cert? I mean that's why code signing is a requirement, right?

It's likely Apple doesn't know which of the million certs they've issued is being used here. One way they could find out is to scour their records to try to figure out which cert has lies all over its application, but they might miss it. Another is to buy the thing to get a copy. 

🎄
robertwalter 9 Years · 276 comments

ktappe said:
r00fus1 said:
So when is Apple going to revoke the cert? I mean that's why code signing is a requirement, right?
It's likely Apple doesn't know which of the million certs they've issued is being used here. One way they could find out is to scour their records to try to figure out which cert has lies all over its application, but they might miss it. Another is to buy the thing to get a copy. 

Wouldn't apple have an idea of the kinds of s/w related to any given developer?  Or the kinds of functionality that the developer might be planning?