![]() ![]() Curious to see if OSX.Pirrit was still alive and spreading, I recently started to research it again. Now it’s time for chapter three (download a PDF of this report here). And once again, some Pirrit’s servers and distribution websites were taken offline. After investigating it, I discovered that a company called TargetingEdge created OSX.Pirrit and, in July, wrote a report discussing how I figured this out. But the story doesn’t end there.Ĭheck out some more of Amit's cutting edge research on Operation Soft Cell.Ī few months later, I learned that a new variant of OSX.Pirrit was in the wild. As a result of the report, some of Pirrit’s servers and a few distribution websites were taken down. Ultimately, OSX.Pirrit’s code had the potential to carry out much more malicious activities. While OSX.Pirrit’s main goal was to display ads, the way it did this contains many practices borrowed from traditional malware. With components such as persistence and the ability to obtain root access, OSX.Pirrit has characteristics usually seen in malware. Called OSX.Pirrit, I discovered that it wasn’t your typical adware program that just floods a person’s browser with ads. In April 2016, I published a research report that analyzed a very nasty piece of adware that targets Mac OS X. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |