"Devil Robber" Trojan Infects Macs, Leeches Their GPUs for Bitcoin Profit
November 1, 2011 10:59 AM
It just works -- except when you're infected
Apple, Inc. (AAPL) has long maligned the Windows PC
as being virus laden
, while promoting its own Mac computers as being immune to such evils. But despite this "It just works" publicity campaign, recent OS X malware [
] has forced Apple onto the defensive,
silently rolling out tools
to remove malicious programs from users' computers.
I. Malware Enslaves Unwitting Mac Users' GPUs
Now another piece of malware has struck unsuspecting Mac owners. The new multiplatform trojan, reported in the wild by security firms Sophos Security and Intego, is much more sophisticated than most of the past malware to hit the Mac platform.
The malicious program installs as part of infected torrent downloads from sites such as
The Pirate Bay
. Thus far the malware has been primarily found to be piggybacking on pirated copies of the image editing app GraphicConverter version 7.4 (whose authors are not involved in the screen and do not approve of the pirating in the first place). The onboard malware is officially known in security circles as OSX/Miner-D, and is nicknamed the "DevilRobber".
Mac torrenters may find themselves the victim of a clever new trojan -- as usual Apple remains silent on the issue. [Source: iQuid]
Once installed on the victim's machine, the malware opens a back-door to the OS X system, allow remote command-and-control. It also monitors your computer, attempting to steal personal information like credit cards.
The malware targets multiple platforms -- including the Mac. [Source: Intego]
To do this it takes screenshots. It also periodically dumps confidential information from various applications -- such as truecrypt data, Vidalia (TOR plugin for Firefox), your Safari browsing history, and .bash_history -- into the creatively named file
. It also records your username and passwords via monitoring using a proxy server (on port 34522 in the most common variant, but likely to change).
But its biggest target is the crypto-currency "bitcoins".
The DevilRobber trojan uses screen captures to steal your password and private information. [Source: Sophos]
Bitcoins are a nation agnostic cyber-currency, beloved by hackers, internet aficionados, and libertarians (among others). In order to seed the initial distribution of "wealth" on the market, people can use computing resources to "mine" Bitcoins, via clients.
The key part of DevilRobber is a Bitcoin mining Java program which the core trojan executes. The trojan enslaves the target's GPU to harvest Bitcoins. Due to the hard-to-trace nature of the cryptocurrency, the malware's authors can successfully obfuscate their identity and safeguard their profits.
The mining program is often how the infection is first noticed, as it makes the system respond sluggishly, given the load it places on the GPU.
As a secondary tactic, the core trojan also attempts to access any unencrypted Bitcoin wallets it can find. It is unknown whether it contains code to access encrypted wallets, but it is reasonable to assume that future updates could deliver the ability to "crack" weakly encrypted wallet files. Compromised wallets transfer their Bitcoin riches to the attacker.
Curiously, the trojan also deletes any files leading pthc. This acronym is associated in internet forums with the phrase "pre-teen hardcore pornograph", aka child porn. It almost appears that the trojan writers have attempted to do a bit of good amid all the evil they have created.
II. Lessons Learned
The new attack illustrates some of the issues surrounding both Apple computers and Bitcoins.
[Sources: Bitcoin Forum (left); Nerd Merit Badges (right)]
For Apple, it's yet another indication that company's public effort to feign ignorance on malware is harming customers. While tech-savvy Mac users understand their platforms are just as susceptible to infections as PCs, in theory if not in practice, less tech-savvy users often believe their Mac is magically immune to infection. This belief is perpetuated by Apple's advertisements and the company's technicians, which were revealed to be
under orders to lie to customers
-- feigning ignorance of infections. This approach has led to at least some of Apple's customers being victimized by the hacking community.
This situation is only likely to get worse, as Apple refuses to publicly acknowledge the danger, as Microsoft has, for risk of losing its "it just works" public image. But
currently in third place
in computer sales by vendor, and with what some hackers say are
weaker protections than Windows 7
, interest in malicious Mac hacking is trending upwards.
As for Bitcoins, the cryptocurrency
holds great promise
, as it is formulated to prevent local government corruption, double spending, inflation, and ineffectual government monetary regulation. However, the Bitcoin market has been dealt a series of setbacks, both via the
entrance of cybercriminals as large-scale miners
, and from account breaches.
Bitcoin's largest exchange recently hacked
, the currency's proponents have
raced to safeguard
their brainchild. More work clearly needs to be done to exclude cybercriminal miners, or Bitcoin risks being intimately associated with illegality.
"We basically took a look at this situation and said, this is bullshit." -- Newegg Chief Legal Officer Lee Cheng's take on patent troll Soverain
GPU Roaring? You May Be Infected With a Bitcoin Trojan Says Symantec
August 17, 2011, 4:47 PM
Analysts: Apple Now Has More Than 10 Percent of the U.S. PC Market
July 14, 2011, 1:52 PM
Bitcoin Giant Mt. Gox Promises to Change Post-Hack
June 22, 2011, 2:21 PM
Inside the Mega-Hack of Bitcoin: the Full Story
June 19, 2011, 6:40 PM
Cracking the Bitcoin: Digging Into a $131M USD Virtual Currency
June 12, 2011, 7:35 PM
More Security Issues for Yahoo
February 16, 2017, 7:45 AM
Android Instant Tethering Only Works for Pixel and Nexus Handsets
February 13, 2017, 7:30 AM
WhatsUp with WhatsApp?
August 29, 2016, 5:23 AM
Fuchsia – Google’s New Open Source Operating System
August 17, 2016, 6:30 AM
Windows 10: End of an Era & A New Beginning
August 1, 2016, 9:59 AM
Free Windows 10 offer ends July 29th, 2016: 10 Reasons to Upgrade Immediately
July 22, 2016, 9:19 PM
Most Popular Articles
Apple iPad – New Faster Processor and More Fun
March 22, 2017, 7:25 AM
OnePlus 3T – 5.5” Optic AMOLED and Dash Charging Technology
March 23, 2017, 8:45 AM
Comparison – Samsung Galaxy TabPro S Vs Microsoft Surface Pro 4
March 21, 2017, 7:40 AM
Huawei P8 Lite 2017 – Android 7 Nougat Smartphone with Octa-Core Processor
March 8, 2017, 7:03 AM
Gigabyte GA-Z170X-Gaming G1 – Intel Thunderbolt 3 Certified Motherboard
March 9, 2017, 6:25 AM
Latest Blog Posts
More Apps From Google
Mar 28, 2017, 7:15 AM
Are you thinking of performance and speed? Intel claims:
Mar 25, 2017, 7:45 AM
Apple buys an automation app called Workflow. The deal was completed today and brings the app along with its developers.
Mar 23, 2017, 7:35 AM
Apple Announces new color for iPhones and iPads
Mar 22, 2017, 7:45 AM
Instagram: You Can Now Save Live Videos For Later
Mar 21, 2017, 7:49 AM
Samsung Galaxy S8 to Get New Color Scheme
Mar 20, 2017, 7:45 AM
What else to worry about?
Mar 17, 2017, 6:45 AM
Icon of the Day: Intel/ NVIDIA or Mobileye
Mar 16, 2017, 6:15 AM
JUST IN - Twitter Hijacked : High-Profile Account Accesses
Mar 15, 2017, 7:07 AM
Mar 14, 2017, 7:30 AM
News and Tips
Mar 13, 2017, 6:30 AM
iPhone 8 – May Not Get Curved Screen
Mar 11, 2017, 8:00 AM
California paves way to self-driving car tests without humans
Mar 11, 2017, 7:18 AM
Smart Machines V hackers
Mar 10, 2017, 7:00 AM
Uber Can Resume Autonomous Car Testing in California
Mar 9, 2017, 6:50 AM
Mar 8, 2017, 7:09 AM
Mar 7, 2017, 8:45 AM
World news 3-6
Mar 6, 2017, 5:40 AM
Mar 4, 2017, 7:40 AM
Mixed News of the Day
Mar 4, 2017, 6:32 AM
Jaguar Land Rover invests in ride-sharing
Mar 3, 2017, 7:00 AM
Mixed News of The World:
Mar 2, 2017, 7:02 AM
More Blog Posts
Copyright 2017 DailyTech LLC. -
Terms, Conditions & Privacy Information