MaMi macOS Malware: What You Need to Know
Joe Reyes, Senior Manager, Security
Wednesday, January 17, 2018

New macOS malware was recently discovered “in the wild.” Named MaMi, this unsophisticated malware can seize DNS settings, with address changes and remaining persistent – even after removing these entries.

Mami can also execute code, download/upload files, persist as a launch item, generate simulated mouse events, and screenshot capture any infected Macs. Attackers can steal credentials and inject ads.

Not every antivirus can locate MaMi as of yet. As a precaution, we are recommending that our clients ensure no machines are infected by running regular scans and updating definitions. Attack vectors, which enable hackers to exploit system vulnerabilities, are currently unknown.

There are ways you can check if your computer is infected

1. Check the System settings in Keychain Access that an unwanted certificate was installed, similar to the sample below:


2. Check if your DNS Server settings have been altered.  See an example of a compromised host below:


What to do if your system is infected

Wipe the drive and re-install Mac OS. If an OS refresh isn’t possible, do the following:

  1. Change your DNS Settings


  1. Remove the rogue root certificate


These steps are necessary to ensuring your machines and data are safe in the age of bad actors and compromised cybersecurity.

Let’s chat about what’s in store for your digital transformation.

Ready to explore?