New Bundlore Adware Targets MacOS With Updated Safari Extensions
Sophos (LSE: SOPH), a global leader in next-generation cybersecurity, analyzed a particularly aggressive sample of what Sophos refer to as “bundleware”, an unscrupulous software installer that drops multiple unwanted applications under the guise of installing one legitimate application, targeting macOS Catalina users. This installer carried a total of seven “potentially unwanted applications” (PUAs), including three that targeted the Safari web browser for the injection of ads, hijacking of download links, and redirecting of search queries for the purpose of stealing users’ clicks to generate income. The injected content in at least one case was used for malvertising – popping up a malicious ad that prompted the download of a fake Adobe Flash update.
Sophos identified the installer as belonging to the Bundlore family, a common macOS bundleware installer family. Bundlore is one of the most common “bundleware” installers for the macOS platform, it accounts for nearly seven percent of all attacks against the macOS platform detected by Sophos, making it the second most common “badware” threat affecting macOS (with Genieo ranking first). Bundlore is also a common threat to Windows, primarily carrying extensions for Google Chrome, and some of the code used to target Chrome is shared with the macOS – targeting versions of the adware.
The Bundlore sample analyzed contained multiple Safari extension payloads, including two in the new App Extension format. Extensions, by their nature, can process and modify the content of web pages viewed in Safari. These extensions, however, were “adware.” They contained code that injected new advertisements and links, including download links, and even redirected search queries from select search engine webpages. Code pulled from a remote server in support of two extensions also revealed some of the details of how these adware tools make money for their developers.
PUAs are among the most common privacy and security threats to macOS. Since they can potentially steal personal data and act as a pathway for malvertising and other malware, Sophos (and other endpoint protection products) block PUAs as a rule. Apple’s XProtect feature in macOS also blocks known Bundlore payloads, and Apple revokes the developer signatures associated with them as well, blocking them from execution on current macOS versions.
“Potentially unwanted applications like Bundlore adware are the most common security threat to MacOS users. Not only are adware developers updating their methods to adapt to recent changes in MacOS and Safari by Apple, but in some cases they’re also dropping multiple PUA payloads with a single installer. And these PUAs go beyond just injecting ads into websites, they’re redirecting where a user’s browser searches are sent for the purpose of stealing clicks for money and even changing links for software downloads. Users should exercise caution when downloading software from unknown sources and stay alert when an unfamiliar app tries to install Browser Extensions,” said Xinran Wu, Senior Threat Researcher at Sophos.
For more information about the new Bundlore adware, you may visit the SophosLabs Uncut article.