Jamf Threat Labs on Thursday issued areportabout a newmalware threat on macOSthat installs and runs crypto - mining software . The malware is tie to pirated copy of Final Cut Pro that are download from unauthorized distribution points on the net .
The pirated adaptation of Final Cut Pro have a crypto - minelaying tool calledXMRigattached . When the software program is downloaded and instal , XMRig launch in the scope . Jamf reports that only “ a smattering ” of malware auspices apps are capable to discover the hidden XMRig installation as of January .
XMRig itself is often used legitimately by crypto miners , but since it ’s an open - generator public utility company , it ’s often dependent to illegitimate uses like this one . With XMRig run in the backcloth , the Mac devotes processing resourcefulness to the minelaying tasks , which affects performance .
Jamf say that this malware initiation usesi2pto send mine cryptocurrency to the assaulter ’s wallet and to download malicious software components to the Mac . The i2p networking protocol is designed for secrecy ; it ’s inscribe and expend a tunnel only used by the user , the server , and any others cede admission . Like XMRig , i2p has legitimate uses , but when used by malware , it increases the difficulty of tracking internet bodily function .
Jamf ’s research found that the beginning of the malware started uploading pirated reading of Final Cut Pro in 2019 and that the malware is clever enough to avoid detection by macOS ’s Activity Monitor app . If Activity Monitor is establish , XMRig stops running and relaunches when the drug user quits Activity Monitor .
In a statement , Apple acknowledged the malware and says it has updated macOS ’s Xprotect to block “ the specific variants summons in JAMF ’s inquiry , ” and ensure that the malware “ does not bypass Gatekeeper protective covering . ” Apple strengthened GateKeeper in macOS Ventura to unceasingly scan apps to control they are correctly signed and have not been modified , but previous versions of macOS only perform an initial handicap .
download the highjack app usually ask using a torrent client , and since these customer do n’t apply any quarantine property , the downloads bypass macOS Monterey ’s validation checks . With macOS Ventura , however , the commandeer transcript of Final Cut Pro wo n’t pass validation and wo n’t set in motion , but the illegitimate installation of XMRig still occurs , and the background mining proceeds .
This malware attack is precisely why Apple wants you to patronize at the App Store , where Apple vets each app to ensure they do n’t contain malware . finally , more third - company certificate apps will catch on to this attack and provide protection ( Jamf notes that this approach is blocked by its Protect Threat Prevention service ) . The easiest way to avoid this tone-beginning is to simply not use pirated software . The prescribed version of Final Cut Pro costs $ 300 , though there is a90 - day free trial . See : Do Macs require antivirus software?andHow to protect your Mac from viruses . We also have a daily round up of thebest antivirus software for Macs .
Update 4:55pm ET : add a program line from Apple .