{"id":76018,"date":"2018-03-05T08:00:08","date_gmt":"2018-03-05T16:00:08","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=76018"},"modified":"2019-06-15T02:57:20","modified_gmt":"2019-06-15T09:57:20","slug":"osxcoldroot-and-the-rat-invasion","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/","title":{"rendered":"OSX\/Coldroot and the RAT invasion"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-76108\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-1024x624.png\" alt=\"Coldroot official logo\" width=\"1024\" height=\"624\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-1024x624.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-150x91.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-300x183.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-768x468.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-657x401.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo.png 1107w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We&#8217;ve previously covered <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-crossrat-malware-used-in-global-cyber-espionage-campaign\/\" target=\"_blank\" rel=\"noopener\">CrossRAT<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-evilosx-malware-spotlights-risk-of-poor-password-hygiene\/\" target=\"_blank\" rel=\"noopener\">EvilOSX<\/a>, and in this article we&#8217;ll explore <strong>OSX\/Coldroot<\/strong>.<\/p>\n<p>First, let&#8217;s briefly take a look at what exactly is a &#8220;RAT.&#8221;\u00a0Later, we&#8217;ll also\u00a0explore why so many RATs have been discovered already in 2018, and we&#8217;ll explain\u00a0how you can protect yourself from these threats.<\/p>\n<h3>What is a RAT?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-76096\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT.jpg\" alt=\"\" width=\"250\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT.jpg 250w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT-32x32.jpg 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT-50x50.jpg 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT-64x64.jpg 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT-96x96.jpg 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/RAT-128x128.jpg 128w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/>RAT\u00a0is an\u00a0acronym that\u00a0stands for &#8220;remote administration tool&#8221; or &#8220;remote access Trojan.&#8221;\u00a0While there are plenty of perfectly legitimate\u00a0software utilities\u00a0for accessing\u00a0another computer (for example, <a href=\"https:\/\/www.apple.com\/remotedesktop\/\" target=\"_blank\" rel=\"noopener\">Apple Remote Desktop<\/a>), the term RAT is generally reserved for software that&#8217;s designed to be installed and used without the computer user&#8217;s knowledge, often with the intention of spying or stealing resources.<\/p>\n<p>RATs commonly include features\u00a0that allow a remote attacker to control or spy on your computer.\u00a0They may allow an attacker to do such things as observe\u00a0your screen, take screenshots, activate your camera or microphone,\u00a0log\u00a0everything you type including your passwords, copy files to or from your computer, or execute other commands, all in the background and without\u00a0your knowledge.<\/p>\n<h3>What&#8217;s the story\u00a0behind OSX\/Coldroot?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-76099\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo.png\" alt=\"\" width=\"250\" height=\"303\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo.png 661w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-124x150.png 124w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-248x300.png 248w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-657x795.png 657w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/>Over the same weekend that Intego researchers discovered <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" target=\"_blank\" rel=\"noopener\">OSX\/Shlayer<\/a>, another researcher, Patrick Wardle, independently <a href=\"https:\/\/digitasecurity.com\/blog\/2018\/02\/19\/coldroot\/\" target=\"_blank\" rel=\"noopener\">discovered<\/a> OSX\/Coldroot, an entirely different\u00a0type of Mac malware: a RAT.<\/p>\n<p>In\u00a0preparation for a talk at an upcoming security conference,\u00a0Wardle searched <a href=\"https:\/\/www.virustotal.com\" target=\"_blank\" rel=\"noopener\">VirusTotal<\/a>\u2014a site that uses dozens of anti-virus\u00a0engines to analyze\u00a0individual files that users upload\u2014for a sample of malware that attempts to\u00a0directly modify\u00a0a macOS database file (TCC.db) to grant itself special permissions.<\/p>\n<p>One\u00a0sample that came up in the search results was undetected by all 60 of VirusTotal&#8217;s anti-virus engines. However, Wardle felt that a variety of indicators pointed to the strong probability that the software\u00a0was malicious. The following were indicators that were relatively easy to discover by a casual observer:<\/p>\n<ul>\n<li><img loading=\"lazy\" class=\"alignright size-full wp-image-76105\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-app-icon.png\" alt=\"\" width=\"120\" height=\"120\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-app-icon.png 120w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-app-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-app-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-app-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-app-icon-96x96.png 96w\" sizes=\"(max-width: 120px) 100vw, 120px\" \/>The software&#8217;s name,\u00a0com.apple.audio.driver2.app, is suspicious\u00a0because it\u00a0seems to be\u00a0trying to disguise itself as Apple software.<\/li>\n<li>Although\u00a0the sample is\u00a0actually a Mac app, its icon is that of a text document, which\u00a0seems to imply that the app&#8217;s creator may have been trying to trick users into double-clicking on it. (Incidentally, this has been a problem for decades, and Apple still hides the .app extension by default in the Finder, making it more difficult for users to detect a\u00a0misleading icon.)<\/li>\n<li>If\u00a0the app is\u00a0opened, it prompts for your password without any observable behavior afterward, which is unusual. (This is how OSX\/Coldroot\u00a0gains the ability to run again\u00a0whenever the Mac is\u00a0restarted.)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"aligncenter size-large wp-image-76117\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt-1024x536.png\" alt=\"\" width=\"675\" height=\"354\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt-1024x536.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt-150x79.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt-300x157.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt-768x402.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt-657x344.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-permissions-prompt.png 1350w\" sizes=\"(max-width: 675px) 100vw, 675px\" \/><\/p>\n<p style=\"text-align: center;\">OSX\/Coldroot prompts for your password. Image: <a href=\"https:\/\/digitasecurity.com\/blog\/2018\/02\/19\/coldroot\/\" target=\"_blank\" rel=\"noopener\">Wardle<\/a><\/p>\n<p>There were also a number of other indicators that the software was probably malicious, but that would only be noticeable to a skilled researcher:<\/p>\n<ul>\n<li>The software attempts to directly modify TCC.db,\u00a0an Accessibility database that tracks special permissions that the user has granted to apps.\u00a0No\u00a0third-party software should ever attempt to directly\u00a0alter that database. (OSX\/Coldroot\u00a0attempts\u00a0this\u00a0hack\u00a0for the purpose of keylogging.)<\/li>\n<li>The software is not digitally signed, as legitimate software from Apple\u00a0and most\u00a0reputable third-party developers usually\u00a0is. (See our recent article\u00a0about\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" target=\"_blank\" rel=\"noopener\">OSX\/Shlayer<\/a>\u00a0malware for\u00a0a brief explanation of\u00a0code signing.)<\/li>\n<li>The sample is packed (compressed) with <a href=\"https:\/\/en.wikipedia.org\/wiki\/UPX\" target=\"_blank\" rel=\"noopener\">UPX<\/a>, a common technique for\u00a0attempting to hide malicious code from anti-virus scanners. It&#8217;s very rare for legitimate Mac software to\u00a0employ a\u00a0code-packing algorithm like UPX.<\/li>\n<\/ul>\n<p>Once the malware is installed, it logs the user&#8217;s keystrokes to a file (misleadingly named &#8220;adobe_logs.log&#8221;).\u00a0It also phones home to a command-and-control server which seems to be located in Australia, and it copies itself into a hidden folder and installs a LaunchDaemon to allow itself to run again\u00a0every time\u00a0the Mac\u00a0is restarted.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76120\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-keylogger-reduced.gif\" alt=\"\" width=\"800\" height=\"817\" \/><\/p>\n<p style=\"text-align: center;\">Coldroot&#8217;s keylogging in action, as revealed by Wardle.<\/p>\n<p>The RAT also has the capability of performing functions for the attacker such as:<\/p>\n<ul>\n<li>listing, renaming, or deleting files and folders<\/li>\n<li>listing the apps that are currently running<\/li>\n<li>launching\u00a0or quitting apps<\/li>\n<li>downloading or uploading files<\/li>\n<li>determining which window is currently in the foreground<\/li>\n<li>streaming continuous screenshots to the attacker<\/li>\n<li>shutting down the computer<\/li>\n<\/ul>\n<p>Wardle discovered that the developer of Coldroot had uploaded a 27-minute demonstration video in 2016. (The video\u00a0was removed from YouTube after Wardle found it, but Wardle has posted a mirror of it in his <a href=\"https:\/\/digitasecurity.com\/blog\/2018\/02\/19\/coldroot\/\" target=\"_blank\" rel=\"noopener\">write-up<\/a>.) The\u00a0video shows that Coldroot\u00a0was evidently developed with cross-platform compatibility, capable of controlling infected Windows and Linux systems in addition to Macs.<\/p>\n<h3>Is\u00a0my Mac infected with OSX\/Coldroot?<\/h3>\n<p>Following are\u00a0the main indicators of compromise (IoCs).\u00a0An infected\u00a0Mac may have\u00a0components located at the following paths:<\/p>\n<ul>\n<li>\/Library\/LaunchDaemons\/com.apple.audio.driver.plist<\/li>\n<li>\/private\/var\/tmp\/adobe_logs.log<\/li>\n<li>\/private\/var\/tmp\/com.apple.audio.driver.app<\/li>\n<li>\/private\/var\/tmp\/runme.sh<\/li>\n<\/ul>\n<p>Network administrators can search Web traffic logs for attempts to access the IP address 45.77.49.118\u00a0on port 80.<\/p>\n<h3>Why so many RATs\u00a0in a short period of time?<\/h3>\n<p>One might wonder: why were three different Mac RATs\u2014<a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-crossrat-malware-used-in-global-cyber-espionage-campaign\/\" target=\"_blank\" rel=\"noopener\">CrossRAT<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-evilosx-malware-spotlights-risk-of-poor-password-hygiene\/\" target=\"_blank\" rel=\"noopener\">EvilOSX<\/a>, and Coldroot\u2014all discovered within a couple months of each other? The answer seems to be simply coincidence. In fact, variants of all three of these RATs were developed in 2017 or earlier, entirely independent of one another.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76111\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-150x98.png\" alt=\"Coldroot official logo\" width=\"150\" height=\"98\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-150x98.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-300x195.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><strong>Coldroot<\/strong>, according to comments in the YouTube video, was evidently originally released\u00a0in 2017, and\u00a0Wardle found a\u00a0source code repository for an early version that was under development in March 2016. WHOIS records indicate that\u00a0<a href=\"http:\/\/web.archive.org\/web\/20151105103744\/http:\/\/www.coldroot.com:80\/\" target=\"_blank\" rel=\"noopener\">Mohamed Osama<\/a> (who goes by the name <a href=\"https:\/\/www.databreaches.net\/vbulletin-foxit-software-forums-hacked-by-coldzer0-hundreds-of-thousands-of-users-info-stolen\/\" target=\"_blank\" rel=\"noopener\">Coldzer0<\/a>) evidently registered the domain for Coldroot&#8217;s homepage in July 2015.\u00a0Thus, Coldroot is\u00a0probably the oldest of the three RATs.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76114\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Dark-Caracal-2717557_640-150x145.png\" alt=\"\" width=\"150\" height=\"145\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Dark-Caracal-2717557_640-150x145.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Dark-Caracal-2717557_640-300x291.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Dark-Caracal-2717557_640-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Dark-Caracal-2717557_640.png 640w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><strong>CrossRAT<\/strong> is cross-platform Java software, designed to infect Windows and Linux systems in addition to Macs. It is\u00a0associated with Dark Caracal, a global cyber-espionage campaign that is believed to have nation-state backing. A joint report by Lookout and the Electronic Frontier Foundation indicates that the &#8220;version 0.1&#8221; sample they found was last modified in March 2017.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-76033\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware-279x300.png\" alt=\"EvilOSX RAT\" width=\"175\" height=\"188\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware-279x300.png 279w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware-139x150.png 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware.png 325w\" sizes=\"(max-width: 175px) 100vw, 175px\" \/><strong>EvilOSX<\/strong> was first discovered almost a year ago, in May 2017.\u00a0The\u00a0February 2018\u00a0variant\u00a0may have been noticed in part because of Wardle&#8217;s\u00a0publication of his findings about OSX\/Coldroot, which might have\u00a0prompted others to look further into Mac RATs. Interestingly, in spite of including features that are overtly malicious in nature, EvilOSX is developed as open-source software that&#8217;s freely available on GitHub, a popular software development repository. The developer goes by the name\u00a0Marten4n6.<\/p>\n<h3>How can Mac users protect themselves from RATs?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76123\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-768x771.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-657x659.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra.png 916w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Keeping your Mac updated with\u00a0the latest version of macOS, and installing Apple security updates as soon as they&#8217;re available in the App Store, are important steps in keeping your Mac protected from a variety of infections.<\/p>\n<p>Wardle notes that the sample of OSX\/Coldroot he found will not run on the latest version of macOS High Sierra (which he speculates may be due to a bug related to UPX packing). He also points out that the malware&#8217;s attempt to directly modify the system file TCC.db is thwarted by the operating system&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/HT204899\" target=\"_blank\" rel=\"noopener\">System Integrity Protection<\/a> (SIP) feature if the user is running macOS Sierra or later.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-76126\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firewall-vs-RAT-300x281.png\" alt=\"\" width=\"200\" height=\"187\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firewall-vs-RAT-300x281.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firewall-vs-RAT-150x141.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firewall-vs-RAT.png 372w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Since RATs\u00a0are designed to run secretively without alerting a user to their presence, and may be installed through any number of methods including as a secondary infection, one of the best ways to protect your\u00a0Mac from RATs is to use anti-virus software with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener\">real-time scanning<\/a>\u00a0together with an outbound firewall. (The firewall that&#8217;s built into macOS only protects against certain inbound threats, but will not prevent malware on your system from phoning home to an attacker.)<\/p>\n<p>Intego&#8217;s\u00a0<a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener\">Mac Premium Bundle X9<\/a>\u00a0includes both VirusBarrier X9 and NetBarrier X9, the best commercial anti-virus and firewall software available for Mac. VirusBarrier detects and eradicates <strong>OSX\/Coldroot<\/strong>, CrossRAT (<strong>Java\/LaunchAgent<\/strong>), and <strong>OSX\/EvilOSX<\/strong>.<\/p>\n<address><em>Editor&#8217;s note: This story was updated March 9,\u00a02018\u00a0for accuracy and comprehensiveness.<\/em><\/address>\n<p><em><strong>Have something to say about this story? Share your comments below!<\/strong><\/em><\/p>\n<p><span style=\"font-size: x-small;\">&#8220;Cold root&#8221; image composed by Joshua Long\u00a0using public-domain images of <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Dicotyledoneae_Asteraceae_herb_-_root_system,_primary_root_becomes_tap_root_and_lateral_roots.JPG\" target=\"_blank\" rel=\"noopener\">roots<\/a> and <a href=\"https:\/\/www.publicdomainpictures.net\/view-image.php?image=100663&amp;picture=icicles\" target=\"_blank\" rel=\"noopener\">icicles<\/a>.\u00a0<a href=\"https:\/\/pixabay.com\/en\/caracal-vector-black-graphics-2717557\/\" target=\"_blank\" rel=\"noopener\">Caracal<\/a>\u00a0and\u00a0<a href=\"https:\/\/pixabay.com\/en\/firewall-network-security-data-29503\/\" target=\"_blank\" rel=\"noopener\">firewall<\/a>\u00a0images:\u00a0Pixabay.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We&#8217;ve previously covered CrossRAT and EvilOSX, and in this article we&#8217;ll explore OSX\/Coldroot. First, let&#8217;s briefly take a look at what exactly is a &#8220;RAT.&#8221;\u00a0Later, we&#8217;ll also\u00a0explore why so many RATs have been discovered already in 2018, and we&#8217;ll explain\u00a0how you can protect yourself from these [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":76111,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[3907,3946,3904,3076,3952,3949],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We&#039;ve previously covered CrossRAT and EvilOSX, and in this\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/Coldroot and the RAT invasion - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We&#039;ve previously covered CrossRAT and EvilOSX, and in this\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-05T16:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-15T09:57:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/\",\"name\":\"OSX\/Coldroot and the RAT invasion - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#primaryimage\"},\"datePublished\":\"2018-03-05T16:00:08+00:00\",\"dateModified\":\"2019-06-15T09:57:20+00:00\",\"description\":\"The past\\u00a0several weeks have brought\\u00a0to light\\u00a0three\\u00a0distinct families of\\u00a0RAT\\u00a0malware for\\u00a0Macs. We've previously covered CrossRAT and EvilOSX, and in this\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/Coldroot and the RAT invasion\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"OSX\/Coldroot and the RAT invasion\",\"datePublished\":\"2018-03-05T16:00:08+00:00\",\"dateModified\":\"2019-06-15T09:57:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#webpage\"},\"wordCount\":1356,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png\",\"keywords\":[\"CrossRAT\",\"EvilOSX\",\"Java\/LaunchAgent\",\"Keylogger\",\"OSX\/Coldroot\",\"OSX\/EvilOSX\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We've previously covered CrossRAT and EvilOSX, and in this","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/Coldroot and the RAT invasion - The Mac Security Blog","og_description":"The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We've previously covered CrossRAT and EvilOSX, and in this","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-03-05T16:00:08+00:00","article_modified_time":"2019-06-15T09:57:20+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/","name":"OSX\/Coldroot and the RAT invasion - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#primaryimage"},"datePublished":"2018-03-05T16:00:08+00:00","dateModified":"2019-06-15T09:57:20+00:00","description":"The past\u00a0several weeks have brought\u00a0to light\u00a0three\u00a0distinct families of\u00a0RAT\u00a0malware for\u00a0Macs. We've previously covered CrossRAT and EvilOSX, and in this","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/Coldroot and the RAT invasion"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"OSX\/Coldroot and the RAT invasion","datePublished":"2018-03-05T16:00:08+00:00","dateModified":"2019-06-15T09:57:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#webpage"},"wordCount":1356,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png","keywords":["CrossRAT","EvilOSX","Java\/LaunchAgent","Keylogger","OSX\/Coldroot","OSX\/EvilOSX"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jM6","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76018"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=76018"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76018\/revisions"}],"predecessor-version":[{"id":88234,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76018\/revisions\/88234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/76111"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=76018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=76018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=76018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}