Security researchers have discovered this week a new ransomware strain targeting macOS users.
Named OSX.ThiefQuest (or EvilQuest), this ransomware is different from previous macOS ransomware threats because besides encrypting the victim's files, ThiefQuest also installs a keylogger, a reverse shell, and steals cryptocurrency wallet-related files from infected hosts.
"Armed with these capabilities, the attacker can main full control over an infected host," said Patrick Wardle, Principal Security Researcher at Jamf. This means that even if victims paid, the attacker would still have access to their computer and continue to steal files and keyboard strokes.
Wardle is currently one of the many macOS security researchers who are analyzing this new threat.
Others who are also investigating EvilQuest include Thomas Reed, Director of Mac & Mobile at Malwarebytes, and Phil Stokes, macOS security researcher at SentinelOne.
Reed and Stokes are currently looking for a weakness or bug in the ransomware's encryption scheme that could be exploited to create a decryptor and help infected victims recover their files without paying the ransom.
ThiefQuest is distributed via pirated software
But the researcher who first spotted the new ThiefQuest ransomware is K7 Lab security researcher Dinesh Devadoss.
Devadoss tweeted about his finding yesterday, June 29. However, new evidence surfaced in the meantime has revealed that EvilQuest has been, in reality, distributed in the wild since the start of June 2020.
Reed told ZDNet in a phone call today that Malwarebytes found ThiefQuest hidden inside pirated macOS software uploaded on torrent portals and online forums, such as a pirated version of music production app Ableton, DJ mixing software Mixed In Key, and security tool Little Snitch.
However, Reed told us he believes the ransomware is most likely more broadly distributed, leveraging many more other apps, and not just these three.
After the encryption process ends, the ransomware installs a keylogger to record all the user's keystrokes, a reverse shell so the attacker can connect to the infected host and run custom commands, and will also look to steal the following types of files, usually employed by cryptocurrency wallet applications.
In his own analysis of ThiefQuest, Reed also noted that the ransomware also attempts to modify files specific to Google Chrome's update mechanism, and use the files as a form of persistence on infected hosts.
"These [Chrome update] files had the content of the patch file prepended to them, which of course would mean that the malicious code would run when any of these files is executed," Reed said. "However, Chrome will see that the files have been modified, and will replace the modified files with clean copies as soon as it runs, so it's unclear what the purpose here is."
Furthermore, researchers also noted that the ThiefQuest also doesn't include a method through which victims could contact the ransomware authors, or a method through which the malware authors could track payments. This means that any victims who pay won't likely receive a decryption key to recover their files, as there is no way for the ThiefQuest group to say who paid and who didn't.
All victims infected by this point should consider their data lost forever, unless researchers find a way to break the encryption and recover their files.
At the time of writing, security researchers couldn't say for sure if ThiefQuest was created as a ransomware from the get-go, or if the ransomware module was added later, on top of another existing remote access trojan. One theory that is becoming more popular as researchers keep analyzing the code was that ThiefQuest started out as a regular infostealer, but was later expanded into ransomware with a low-quality file-encryption module that ended up destroying user files.
Wardle, who has created several open-source macOS security tools, said that a tool he released in 2016, named RansomWhere, can detect and stop EvilQuest from running. Reed also said that Malwarebytes for Mac was also updated to detect and stop this ransomware before it does any damage.
ThiefQuest is the third ransomware strain that has exclusively targeted macOS users after KeRanger and Patcher. Another macOS ransomware strain called Mabouia only existed at a theoretical level and was never released in the real world.
Article updated on July 2 after security researchers renamed the ransomware from EvilQuest to ThiefQuest, as the previous name was also used by Chaosoft Games for one of their Steam games and the game maker requested researchers change it to avoid confusion.
The Mac malware most likely to attack your PC this year