New macOS malware was recently discovered “in the wild.” Named MaMi, this unsophisticated malware can seize DNS settings, with address changes 184.108.40.206 and 220.127.116.11 remaining persistent – even after removing these entries.
Mami can also execute code, download/upload files, persist as a launch item, generate simulated mouse events, and screenshot capture any infected Macs. Attackers can steal credentials and inject ads.
Not every antivirus can locate MaMi as of yet. As a precaution, we are recommending that our clients ensure no machines are infected by running regular scans and updating definitions. Attack vectors, which enable hackers to exploit system vulnerabilities, are currently unknown.
There are ways you can check if your computer is infected
1. Check the System settings in Keychain Access that an unwanted certificate was installed, similar to the sample below:
2. Check if your DNS Server settings have been altered. See an example of a compromised host below:
What to do if your system is infected
Wipe the drive and re-install Mac OS. If an OS refresh isn’t possible, do the following:
Change your DNS Settings
Remove the rogue root certificate
These steps are necessary to ensuring your machines and data are safe in the age of bad actors and compromised cybersecurity.