How to get free YouTube subscribers, likes and views?
Get Free YouTube Subscribers, Views and Likes

DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction

Follow
HackersOnBoard

Whenever a new Mac malware specimen is uncovered, it provides a unique insight into the offensive Mac capabilities of hackers or nationstate adversaries. Better yet, such discoveries provide fullyfunctional capabilities that may be weaponized for our own surreptitious purposes! I mean, life is short, why write your own?

We'll begin this talk by discussing the methodology of subverting existing malware for "personal use", highlighting both the challenges and benefits of such an approach.

Next, we'll walkthru the weaponization of various Mac malware specimens, including an interactive backdoor, a fileexfiltration implant, ransomware, and yes, even adware. Customizations include various runtime binary modifications that will coerce such malware to accept tasking from our own C&C servers, and/or automatically perform actions on our behalf.

Of course, in their pristine state, such samples are currently detected by AV products. As such we'll also walkthru subtle modifications that will ensure our modified tools remains undetected by traditional detection approaches.

In conclusion, we'll highlight novel heuristic methods that can generically detect such threats to ensure Mac users remain protected even from such weaponized threats.

posted by Mengarli82