RiSec.n0tst3 5 January 2022
Looking back at campaigns directly targeting the macOS platform for the last several years, we have rounded up 20 of the most commonly used built-in tools (ab)used by threat actors, malware, and adware, complete with in-the-wild examples and associated MITRE behavioural indicators. We’ve also added links for each threat so that you can follow up on further details such as IoCs, hashes and researcher analyses. chmod (/bin/chmod) Change file modes or Access Control Lists. Generally used by malware in order to give executable permissions to an executable payload retrieved...