Story image

Unit 42 discovers Komplex trojan targeting OS X systems

27 Sep 16

The Sofacy Group is still coming up with new trojans, with Unit 42 researchers reporting that an OS X trojan called 'Komplex' is on the scene.

Sofacy, also known as APT28, Pawn Storm, Fancy Bear, and Sednit, have been continuing their operations and expanding their attack toolset.

Trojans with the 'Komplex' tag are being monitored by Palo Alto Networks Autofocus threat intelligence platform and researchers say that the new trojan targets the aerospace industry running OS X.

Researchers say that the Komplex trojan has been used before, in an attack on OS X systems running the MacKeeper antivirus application. The Komplex was delivered as a payload.

The company says that the Komplex trojan is a prime example of how Sofacy is looking more towards multi-platform attacks.

Researchers also say that the trojan is similar to another Sofacy tool - the Carberp variant that been used in attacks on Windows machines.

Komplex command and control (C2) domains were also similar to those used in phishing campaign infrastructures that Sofacy has been known to use.

In addition, the trojan is able to download files, execute and delete files and interact with the system shell.

Palo Alto Networks says that customers using WIldFire are protected, as it identified known Komplex executables as malicious.

For IPS, signature #14442 Sofacy.Gen Command And Control Traffic can detect and block outbound C2 requests generated by the Komplex Trojan.

Customers using AutoFocus can also track the trojan by using the Komplex tag.

Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Hands-on review: The Ekster Wallet protects your cards against RFID attacks
For some time now, I’ve been protecting my credit cards with tinfoil. The tinfoil hat does attract a lot of comments, but thanks to Ekster, those days are now happily behind me.