Shlayer is a Trojan downloader that primarily targets macOS systems, known for distributing various types of adware, including Bundlore. It is distributed through fake Flash Player updates and deceptive websites, tricking users into installing unwanted software. Once executed, Shlayer connects to command and control (C2) servers to download additional payloads.
Symptoms
You might observe the following artifacts associated with this threat:
- Pop-up advertisements appear unexpectedly.
- Unexpected redirects to suspicious websites.
- Installation of adware, including Bundlore, without user consent.
- Decreased system performance due to adware activity.
Technical Breakdown
Shlayer is distributed through deceptive means such as:
- Fake Software Updates: Most commonly posing as Adobe Flash Player updates, tricking users into installation.
- Deceptive Websites: Promoted via malvertising campaigns that direct users to malicious sites.
Shlayer performs the following actions:
- Payload Delivery: Connects to a C2 server to download additional malicious payloads, including adware.
- Persistence Mechanism: May install launch agents or login items to ensure it runs at startup.
- Traffic Redirection: Alters browser settings to redirect search traffic for ad revenue generation.
Next Steps
Iru Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect.
While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.
In the future, avoid downloading and installing software from torrent sources or untrusted websites. Ensure that all applications are obtained from official and reputable sources to maintain system integrity and security.
ProcessHub Stealer
ProcessHub stealer is a relatively new finding attributed to China, and is designed to collect user files including bash history, zsh history, GitHub configuration, SSH information, and the Keychain. It completes these actions in a multi-stage process including the downloading of a script from its command and control server, the collection of user files, and the uploading these files.
Learn MoreCthulhu
Cthulhu is a macOS stealer that masquerades as legitimate software to deceive users into installing it. Once executed, it collects sensitive information, including system data, browser credentials, cryptocurrency wallets, and game account details. Cthulhu has also been known to target enterprise environments to conduct cyber espionage campaigns.
Learn MoreAppleJeus
AppleJeus is a sophisticated macOS trojan attributed to North Korea's state-sponsored APT Lazarus Group. This malware has been used for years to infiltrate cryptocurrency exchanges and financial service companies by masquerading as legitimate applications. AppleJeus enables unauthorized access, facilitates data exfiltration, and can lead to significant financial losses.
Learn More