{"id":74224,"date":"2018-01-15T16:43:59","date_gmt":"2018-01-16T00:43:59","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=74224"},"modified":"2019-06-15T03:00:02","modified_gmt":"2019-06-15T10:00:02","slug":"ay-mami-new-dns-hijacking-mac-malware-discovered","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/","title":{"rendered":"\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered"},"content":{"rendered":"<p><em><strong>UPDATE:<\/strong> On January 17, we added\u00a0additional information about the malware&#8217;s method of persistence and another file dropped by the malware, as well as the forum user&#8217;s reported source of infection.<\/em><\/p>\n<p>Very early in the morning on Friday, January 12, Mac security researcher Patrick Wardle\u00a0published\u00a0a\u00a0<a href=\"https:\/\/objective-see.com\/blog\/blog_0x26.html\" target=\"_blank\" rel=\"noopener\">report<\/a>\u00a0about a\u00a0brand new Mac malware, dubbed <strong>OSX\/MaMi<\/strong>.<\/p>\n<p>&#8220;2018 is barely two weeks old, and already it looks like we&#8217;ve got [a] new piece of macOS malware!&#8221; Wardle said, upon introducing his analysis of OSX\/MaMi.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">OMG do we have the 1\u02e2\u1d57 macOS malware of 2018? and can I name it!? OSX\/MaMi is undetected by AV (src: VT) infecting Macs around the world &#8211; persistently installs new root cert &amp; hijacks DNS settings: <a href=\"https:\/\/t.co\/kkriVSPNC7\">https:\/\/t.co\/kkriVSPNC7<\/a> ???\u2620\ufe0f &#8230;mahalo to a good friend for the ping ?<\/p>\n<p>\u2014 Objective-See (@objective_see) <a href=\"https:\/\/twitter.com\/objective_see\/status\/951766530949226496?ref_src=twsrc%5Etfw\">January 12, 2018<\/a><\/p><\/blockquote>\n<p>On Thursday, a user of a computer security forum had <a href=\"https:\/\/forums.malwarebytes.com\/topic\/218198-dns-hijacked\/\" target=\"_blank\" rel=\"noopener\">posted<\/a> asking for help with removing some malware from his Mac that another malware-removal utility wasn&#8217;t detecting.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-74227\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post.png\" alt=\"\" width=\"1780\" height=\"776\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post.png 1780w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post-150x65.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post-300x131.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post-768x335.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post-1024x446.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-forum-post-657x286.png 657w\" sizes=\"(max-width: 1780px) 100vw, 1780px\" \/><\/p>\n<p style=\"text-align: center;\">The original forum post that started the MaMi investigation.<\/p>\n<p>Since neither the forum hosts nor other forum users had responded publicly, Wardle decided to do some investigating.<\/p>\n<p>Intego also began analyzing the malware early Friday morning and updated its\u00a0<a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">VirusBarrier<\/a>\u00a0antivirus definitions to detect this new malware as <strong>OSX\/MaMi.A<\/strong>.<\/p>\n<p>Following is a compilation of some interesting findings from Intego researchers,\u00a0Wardle, Noar (another researcher), and Thomas Reed.<\/p>\n<h3>What Does the OSX\/MaMi Malware Do?<\/h3>\n<p>The main objective of the malware is to hijack a user&#8217;s DNS.<\/p>\n<p>DNS stands for domain name system, a technology used by nearly every Internet-connected device to resolve domain names to their actual Internet protocol (IP) address. For example, if you type &#8220;intego.com&#8221; into your browser, DNS is how your computer knows where to find Intego&#8217;s site.<\/p>\n<p>OSX\/MaMi malware attempts to hijack a victim&#8217;s DNS requests by injecting its own DNS servers into an infected system. It also installs a malicious root certificate authority (root CA) so that secure HTTPS requests can also be hijacked by the malware without scary warnings appearing in the victim&#8217;s browsers.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-74242\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MITM-Diagram.png\" alt=\"\" width=\"336\" height=\"293\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MITM-Diagram.png 336w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MITM-Diagram-150x131.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MITM-Diagram-300x262.png 300w\" sizes=\"(max-width: 336px) 100vw, 336px\" \/>The combination of hijacking DNS and injecting a root CA make it possible for the malware creator to engage in &#8220;man-in-the-middle&#8221; (MitM) attacks against a victim. An attacker could potentially do things such as spy on everything a victim does online, see every bit of data typed into &#8220;secure&#8221; Web forms, and inject malware or advertisements into any Web page (even if the page uses HTTPS).<\/p>\n<p>Although analysis of the malware so far has not shown any utilization of the following functions, the malware also appears to have the capability (or at least incomplete attempts at adding the capability) to execute AppleScript code, simulate mouse clicks, and take screenshots. It also appears to contain code for installing a method of persistence called a LaunchAgent (see our recent <a href=\"https:\/\/www.youtube.com\/watch?v=P5m8wsQ5BFw\" target=\"_blank\" rel=\"noopener\">interview with Amit Server about OSX\/Pirrit<\/a> for more about LaunchAgents), but so far we have not observed a LaunchAgent being installed by OSX\/MaMi.<\/p>\n<p><strong>UPDATE:<\/strong>\u00a0On the forum user&#8217;s computer, the malware\u00a0was installed as a LaunchDaemon\u2014similar to a LaunchAgent\u2014with the file path\u00a0\/Library\/LaunchDaemons\/Cyclonica.plist (note that the file name might differ on other infected systems, but one unique thing\u00a0about the file name is that it doesn&#8217;t follow the standard <a href=\"https:\/\/en.wikipedia.org\/wiki\/Reverse_domain_name_notation\" target=\"_blank\" rel=\"noopener\">reverse domain notation<\/a> convention as discussed in\u00a0the aforementioned\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=P5m8wsQ5BFw\" target=\"_blank\" rel=\"noopener\">interview with Serper about Pirrit<\/a>). This\u00a0LaunchDaemon plist file references\u00a0a malicious file that&#8217;s downloaded\u00a0to\u00a0the user&#8217;s home directory, in this case ~\/Library\/Application Support\/Cyclonica\/Cyclonica (again, the folder and file names might differ on other infected systems, but will probably match the name of the LaunchDaemon plist file). Thanks to <a href=\"https:\/\/twitter.com\/thomasareed\" target=\"_blank\" rel=\"noopener\">Thomas Reed<\/a> for working with the forum user to obtain this information.<\/p>\n<h3>Why &#8220;MaMi&#8221;?<\/h3>\n<p>Wardle, the first researcher to write up a report on the malware, called it OSX\/MaMi, so Intego has adopted the name. Although several antivirus vendors are calling it &#8220;OSX\/DNSChanger,&#8221; we <a href=\"https:\/\/twitter.com\/patrickwardle\/status\/952698364205809664\" target=\"_blank\" rel=\"noopener\">agree with Wardle<\/a>\u00a0that it&#8217;s helpful to distinguish between MaMi (which is new malware) and other DNS-modifying malware that has already been called <a href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-get-left-in-the-dark-disinfect-your-computer-from-dnschanger-malware-by-july-9\/\" target=\"_blank\" rel=\"noopener\">DNSChanger<\/a> in the past.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Good: detection for OSX\/MaMi went from 0\/59 to 26\/59 on VirusTotal: <a href=\"https:\/\/t.co\/JXSs0iRngo\">https:\/\/t.co\/JXSs0iRngo<\/a> Bad: several AVs calling it &#8216;OSX\/DNSChanger&#8217; &#8230;which IMHO, is dumb as there&#8217;s an unrelated Mac malware from 2012, *already* called this (even has a wikipedia: <a href=\"https:\/\/t.co\/VHetpnH811\">https:\/\/t.co\/VHetpnH811<\/a>) ? <a href=\"https:\/\/t.co\/Aiq4EbiAy3\">pic.twitter.com\/Aiq4EbiAy3<\/a><\/p>\n<p>\u2014 patrick wardle (@patrickwardle) <a href=\"https:\/\/twitter.com\/patrickwardle\/status\/952698364205809664?ref_src=twsrc%5Etfw\">January 15, 2018<\/a><\/p><\/blockquote>\n<p>The name &#8220;MaMi&#8221; appears in text strings within the malware (mami_activity, loadMaMiAtPath, unloadMaMiAtPath, removeMaMiAtPath, initMaMiSettings, SBMaMiSettings, SBMaMiManager, etc.).<\/p>\n<p><em>Mami<\/em> is an Israeli\u00a0<a href=\"https:\/\/www.haaretz.com\/jewish\/features\/word-of-the-day-mami-1.460474\" target=\"_blank\" rel=\"noopener\">term of endearment<\/a>,\u00a0meaning something akin to sweetie or honey; for example, a mother might call her child by that name. We&#8217;ll\u00a0explain the Israel connection below.<\/p>\n<p>(Incidentally, &#8220;mami&#8221; has several meanings in different cultures. Similar to the Israeli word, it\u00a0is also a Spanish word that can be a term of endearment in some contexts; it can also mean mommy, beautiful woman, or young girl with whom the speaker is familiar.\u00a0Mami is also a female given name in Japanese meaning &#8220;real beauty,&#8221; and it&#8217;s also\u00a0the name of a noodle soup in the Philippines.)<\/p>\n<h3>How the Malware Spreads<\/h3>\n<p>At this time, it&#8217;s not\u00a0known precisely how the original forum user got infected. However, several Web sites are currently hosting copies of the malware binary, so one possibility is that OSX\/MaMi may be a secondary infection installed by other malware that&#8217;s already installed on a victim&#8217;s system.<\/p>\n<p><strong>UPDATE:<\/strong>\u00a0The forum user later <a href=\"https:\/\/forums.malwarebytes.com\/topic\/218198-dns-hijacked\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> that his coworker&#8217;s computer became infected after clicking\u00a0in a browser popup window: &#8220;\u2026this was a lame method of transmission. A popup came up that she clicked and followed through with.&#8221; Thanks to\u00a0<a href=\"https:\/\/twitter.com\/thomasareed\" target=\"_blank\" rel=\"noopener\">Thomas Reed<\/a>\u00a0for\u00a0working with the forum user to obtain this information.<\/p>\n<h3>How to Tell if Your Mac Is Infected<\/h3>\n<p><span style=\"color: #ff0000;\">WARNING:<\/span> Do not attempt to connect to the domain names or IP addresses below; doing so may lead to infection!<\/p>\n<p>The most obvious indicators of compromise (IoCs) are that an infected computer will have the following IP addresses as DNS\u00a0servers:\u00a0<strong>82.163.143\u2024135<\/strong> and <strong>82.163.142\u2024137<\/strong>.<\/p>\n<p>There are a number of methods for checking which DNS servers your Mac is using.<\/p>\n<p>If you&#8217;re using a wired Ethernet connection, click on the Apple menu and select System Preferences&#8230;, then click on Network, and then (if it&#8217;s not already selected) click on Ethernet (or Thunderbolt Ethernet) in the left pane. In the right pane, you&#8217;ll see a &#8220;DNS Server:&#8221; line which may contain\u00a0one or more\u00a0DNS IP addresses. If you see one or both of the IP addresses above that start with &#8220;82.163.&#8221; then your Mac has been infected.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-74230\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-DNS-Ethernet.png\" alt=\"\" width=\"668\" height=\"563\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-DNS-Ethernet.png 668w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-DNS-Ethernet-150x126.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-DNS-Ethernet-300x253.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-DNS-Ethernet-657x554.png 657w\" sizes=\"(max-width: 668px) 100vw, 668px\" \/><\/p>\n<p style=\"text-align: center;\">MaMi DNS servers on Ethernet. Image credit: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x26.html\" target=\"_blank\" rel=\"noopener\">Wardle<\/a><\/p>\n<p>If you&#8217;re using a wireless network, you can copy and paste the following into the Terminal app on your Mac:<\/p>\n<pre>networksetup -getdnsservers Wi-Fi<\/pre>\n<p>If you see one of the IP addresses above that start with &#8220;82.163.&#8221; then your Mac has been infected. (Most often you&#8217;ll see the message, &#8220;There aren&#8217;t any DNS Servers set on Wi-Fi,&#8221; or if\u00a0you&#8217;ve manually added DNS servers in the past you&#8217;ll see them listed.)<\/p>\n<p>Another indicator of compromise is the presence of a root CA for the domain cloudguard(.)me; you can search for the word cloudguard in the Keychain Access app on your Mac, and if it appears in the results, then your Mac has been infected.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-74239\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-root-CA-cropped.png\" alt=\"\" width=\"770\" height=\"643\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-root-CA-cropped.png 770w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-root-CA-cropped-150x125.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-root-CA-cropped-300x251.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-root-CA-cropped-768x641.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/MaMi-root-CA-cropped-657x549.png 657w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><\/p>\n<p style=\"text-align: center;\">Root CA installed by OSX\/MaMi. Image credit: <a href=\"https:\/\/objective-see.com\/blog\/blog_0x26.html\" target=\"_blank\" rel=\"noopener\">Wardle<\/a><\/p>\n<p>The <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works\/\" target=\"_blank\" rel=\"noopener\">Keychain Access<\/a> and Terminal apps are both located in \/Applications\/Utilities in your Macintosh HD.<\/p>\n<p>The malware may also drop files in \/Library\/LaunchDaemons and ~\/Library\/Application Support, as previously noted.<\/p>\n<p>Partial instructions for manually removing the DNS servers and root CA from a Mac can be found in <a href=\"https:\/\/objective-see.com\/blog\/blog_0x26.html\" target=\"_blank\" rel=\"noopener\">Wardle&#8217;s article;<\/a>\u00a0however,\u00a0attempting to manually clean\u00a0a system may be insufficient, as\u00a0the forum user who originally reported the malware said that after manually removing the DNS\u00a0servers they became installed again.<\/p>\n<p>We strongly recommend scanning your system with <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier<\/a> to check for\u00a0persistent\u00a0infections.<\/p>\n<p>Network administrators can find potentially infected systems on\u00a0their network by looking for attempts to\u00a0contact\u00a0the following domains on port 80:<\/p>\n<ul>\n<li>squartera(.)info<\/li>\n<li>gorensin(.)info<\/li>\n<li>honouncil(.)info<\/li>\n<li>sincentre(.)info<\/li>\n<li>regardens(.)info<\/li>\n<li>angeing(.)info<\/li>\n<li>definitial(.)info<\/li>\n<li>humption(.)info<\/li>\n<li>lilovakia(.)info<\/li>\n<li>accessful(.)info \u2014\u00a0not known to be used by the malware variants we&#8217;ve seen, but evidently registered by\u00a0one of the same people on the same date<\/li>\n<\/ul>\n<h3>How Long Has the Malware Been Around?<\/h3>\n<p>The earliest known sample of OSX\/MaMi we&#8217;ve found so far was first uploaded to VirusTotal on <a href=\"https:\/\/www.virustotal.com\/#\/file\/0d524b4ff2505c3517e8c03badb125d307c13ea3906518b8e9892b7716af7583\/details\" target=\"_blank\" rel=\"noopener\">November 15, 2017<\/a>. Another sample was\u00a0originally uploaded to VirusTotal on <a href=\"https:\/\/www.virustotal.com\/#\/file\/df4f27e7b5d2363a9d17e9f08a31672330591c366a5aff681e5e71ef9e2d03cf\/details\" target=\"_blank\" rel=\"noopener\">December 18, 2017<\/a>. The sample analyzed by Wardle, which\u00a0is\u00a0still being distributed via many domains,\u00a0was\u00a0originally uploaded to VirusTotal on <a href=\"https:\/\/www.virustotal.com\/#\/file\/5586be30d505216bdc912605481f9c8c7bfd52748f66c5e212160f6b31fd8571\/details\" target=\"_blank\" rel=\"noopener\">January 8, 2018<\/a>, and it appears to be a more recent version.<\/p>\n<p>Although this Mac malware doesn&#8217;t\u00a0seem to have been\u00a0in the wild for very long, Windows versions of the malware have been observed in the wild as far back as 2015, as detailed below.<\/p>\n<h3>Related Windows Malware<\/h3>\n<p>Another Mac malware researcher, Noar (<a href=\"https:\/\/twitter.com\/noarfromspace\" target=\"_blank\" rel=\"noopener\">@noarfromspace<\/a>), made a <a href=\"https:\/\/twitter.com\/objective_see\/status\/951918105294340097\" target=\"_blank\" rel=\"noopener\">connection<\/a>\u00a0between OSX\/MaMi and <a href=\"https:\/\/thecomputerperson.wordpress.com\/2015\/08\/19\/the-mystery-of-82-163-143-172-and-82-163-142-174\/\" target=\"_blank\" rel=\"noopener\">DNSUnlocker<\/a>\u2014very similar malware that was found on Windows systems in August 2015.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\"><a href=\"https:\/\/twitter.com\/noarfromspace?ref_src=twsrc%5Etfw\">@noarfromspace<\/a> dug up: <a href=\"https:\/\/t.co\/AK33MDzv16\">https:\/\/t.co\/AK33MDzv16<\/a> Discusses the Windows malware &#8216;DNSUnlocker&#8217; which hijacks DNS settings &amp; installs same cert as OSX\/MaMi. Guessing OSX\/MaMi is a (fully re-written?) ?-version, with extra macOS-specific evilness&#8230; Also note: CloudGuard?? <a href=\"https:\/\/t.co\/rGjQn5L0ir\">pic.twitter.com\/rGjQn5L0ir<\/a><\/p>\n<p>\u2014 Objective-See (@objective_see) <a href=\"https:\/\/twitter.com\/objective_see\/status\/951918105294340097?ref_src=twsrc%5Etfw\">January 12, 2018<\/a><\/p><\/blockquote>\n<p>Both OSX\/MaMi and DNSUnlocker send DNS requests to IP addresses owned by GreenTeam Internet, a company based in Tel Aviv, Israel that claims to offer Internet safety services, &#8220;from safe Internet for kids and families, to malware and phishing protection for businesses.&#8221;<\/p>\n<p>That&#8217;s interesting enough, but even more telling is that OSX\/MaMi and DNSUnlocker install the exact same root CA (which is issued to GreenTeam Internet). The certificate was generated in July 2014, and it has an expiration date in July 2044.<\/p>\n<h3>Who&#8217;s Behind the Malware?<\/h3>\n<p>Several domains referenced\u00a0within the malware are registered to an Anton Vodonaev, who&#8217;s supposedly located in Ukraine and whose e-mail addresses contain the name &#8220;prolone&#8221; (possibly a reference to the steroid drug of that name).<\/p>\n<p>Several domains that are hosting the malware binary are registered to a Vladislav Kakoshin at a different mailing address and postal code in Ukraine.<\/p>\n<p>Of course, it is entirely possible that these names may be pseudonyms and that the\u00a0individual or\u00a0individuals might not really be in Ukraine.<\/p>\n<p>All of the domains registered to these names were registered on May 30, 2017 through the same domain name registrar.<\/p>\n<p>It&#8217;s unclear what, if any, direct connection the alleged Ukrainian individuals may have with GreenTeam Internet in Israel.<\/p>\n<h3>Intego VirusBarrier X9 Users Are Protected<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\" target=\"_blank\" rel=\"noopener\">Intego VirusBarrier<\/a>\u00a0with up-to-date virus\u00a0definitions will detect this malware as <strong>OSX\/MaMi.A<\/strong>.<\/p>\n<p>We recommend <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener\">Mac Premium Bundle X9<\/a>, which includes VirusBarrier, for the most comprehensive commercial anti-malware protection and utility suite available for Mac.<\/p>\n<h3>Subscribe for More Mac Security News<\/h3>\n<p>We&#8217;ll talk about OSX\/MaMi on this\u00a0week&#8217;s edition of the Intego Mac Podcast; <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe in iTunes\/Podcasts<\/a> to make sure you get the latest episode on Wednesday.<\/p>\n<p>Be sure to\u00a0subscribe to\u00a0<strong>The Mac Security Blog<\/strong>, the\u00a0<strong><a href=\"http:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a><\/strong>, and\u00a0<strong><a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\">Intego&#8217;s YouTube channel<\/a><\/strong>\u00a0to make sure you don&#8217;t miss any important news!<br \/>\n<span style=\"font-size: x-small;\">Man in the middle diagram image credit:\u00a0<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:MITM_Diagramm.png\" target=\"_blank\" rel=\"noopener\">Nasanbuyn<\/a> and <a href=\"https:\/\/store.storeimages.cdn-apple.com\/4974\/as-images.apple.com\/is\/image\/AppleInc\/aos\/published\/images\/r\/ef\/refurb\/2017\/refurb-2017-imac-215-retina-gallery?wid=1144&amp;hei=1144&amp;fmt=jpeg&amp;qlt=95&amp;op_sharpen=0&amp;resMode=bicub&amp;op_usm=0.5%2C0.5%2C0%2C0&amp;iccEmbed=0&amp;layer=comp&amp;.v=1499116835523\" target=\"_blank\" rel=\"noopener\">Apple<\/a>;\u00a0modified by\u00a0Joshua Long.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>UPDATE: On January 17, we added\u00a0additional information about the malware&#8217;s method of persistence and another file dropped by the malware, as well as the forum user&#8217;s reported source of infection. Very early in the morning on Friday, January 12, Mac security researcher Patrick Wardle\u00a0published\u00a0a\u00a0report\u00a0about a\u00a0brand new Mac malware, dubbed OSX\/MaMi. &#8220;2018 is barely two weeks [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":8763,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[2755,86,3874],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"UPDATE: On January 17, we added\u00a0additional information about the malware&#039;s method of persistence and another file dropped by the malware, as well as the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"UPDATE: On January 17, we added\u00a0additional information about the malware&#039;s method of persistence and another file dropped by the malware, as well as the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-16T00:43:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-15T10:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/\",\"name\":\"\\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#primaryimage\"},\"datePublished\":\"2018-01-16T00:43:59+00:00\",\"dateModified\":\"2019-06-15T10:00:02+00:00\",\"description\":\"UPDATE: On January 17, we added\\u00a0additional information about the malware's method of persistence and another file dropped by the malware, as well as the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"\\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered\",\"datePublished\":\"2018-01-16T00:43:59+00:00\",\"dateModified\":\"2019-06-15T10:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#webpage\"},\"wordCount\":1890,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"DNSChanger\",\"Malware\",\"OSX\/MaMi\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"UPDATE: On January 17, we added\u00a0additional information about the malware's method of persistence and another file dropped by the malware, as well as the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/","og_locale":"en_US","og_type":"article","og_title":"\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered - The Mac Security Blog","og_description":"UPDATE: On January 17, we added\u00a0additional information about the malware's method of persistence and another file dropped by the malware, as well as the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-01-16T00:43:59+00:00","article_modified_time":"2019-06-15T10:00:02+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/","name":"\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#primaryimage"},"datePublished":"2018-01-16T00:43:59+00:00","dateModified":"2019-06-15T10:00:02+00:00","description":"UPDATE: On January 17, we added\u00a0additional information about the malware's method of persistence and another file dropped by the malware, as well as the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"\u00a1Ay, MaMi! New DNS-hijacking Mac malware discovered","datePublished":"2018-01-16T00:43:59+00:00","dateModified":"2019-06-15T10:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#webpage"},"wordCount":1890,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["DNSChanger","Malware","OSX\/MaMi"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ay-mami-new-dns-hijacking-mac-malware-discovered\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jja","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74224"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=74224"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74224\/revisions"}],"predecessor-version":[{"id":88243,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74224\/revisions\/88243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=74224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=74224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=74224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}