© Photo: Nawal Karimi (Shutterstock)
What's Silver Sparrow? No, it's not a Game of Thrones character—has that ship sailed?—but rather a new piece of macOS malware that runs on both Intel and M1-based Macs. That makes it the second piece of known malware for the latter, but there's a silver lining: Researchers discovered the malicious software before it had a chance to actually harm your system.
Common types of malware you can encounter on Mac are: Spyware and keyloggers – steal the user's personal information. Backdoor infections – remotely take control of your computer. Botnet – alters Mac into a shadow bot.
Protect your Mac from malware. MacOS has many features that help protect your Mac and your personal information from malicious software, or malware. One common way malware is distributed is by embedding it in a harmless-looking app. You can reduce this risk by using software only from reliable sources. Common types of malware you can encounter on Mac are: Spyware and keyloggers – steal the user's personal information. Backdoor infections – remotely take control of your computer. Botnet – alters Mac into a shadow bot. RELATED: Mac OS X Isn't Safe Anymore: The Crapware / Malware Epidemic Has Begun Malwarebytes makes well-regarded security utilities for Windows. Malwarebytes originally expanded into the Mac security software arena by purchasing and rebranding a popular application named 'Adware Medic' that we and others have used successfully in the past.
As Red Canary's Tony Lambert writes:
'..the ultimate goal of this malware is a mystery. We have no way of knowing with certainty what payload would be distributed by the malware, if a payload has already been delivered and removed, or if the adversary has a future timeline for distribution. Based on data shared with us by Malwarebytes, the nearly 30,000 affected hosts have not downloaded what would be the next or final payload.'
Click on over to Red Canary's blog if you want to get into the nitty-gritty technical details of Silver Sparrow. If you're curious about whether you've been infected, odds are you haven't, nor will you be going forward—Apple has suspended the developer certificates used to sign the package files that start the infection, meaning that Mac users will be unable to install it if they're using the Mac's default security settings. (I haven't found said malware, so I can't verify whether your Mac will warn you about not installing it, or simply mark it as a malicious app and forbid you from doing so.)
Nevertheless, if you're concerned that you might have been infected, think about what you've done with your system lately. Were you prompted by a website to download a software package and/or update? Was it something you weren't intending to download or install until a website suggested you should? Was said package file named something simple and dull, like 'update.pkg' or 'updater.pkg?'
If so, a little suspicion is warranted. While there's no real way to detect whether said malware is on your system based on observable behavior—since it's not doing anything at the moment, and it's unclear if it ever will—you can go hunting around for files the malware drops on your system. Red Canary notes four files that suggest your system may be infected:
- ~/Library/._insu (empty file used to signal the malware to delete itself)
- /tmp/agent.sh (shell script executed for installation callback)
- /tmp/version.json (file downloaded from from S3 to determine execution flow)
- /tmp/version.plist (version.json converted into a property list)
This lengthy (and incredibly helpful) writeup from Ars Technica commenter effgee will help you find the offending files, confirm they're problematic, and remove them. Since Malwarebytes worked with Red Canary on detection data for its analysis and published piece, odds are good that using the free version of that popular anti-malware scanner/remover should be sufficient, too.
If the current version of the app doesn't find and remove Silver Sparrow, make sure you keep its definitions updated—and that you're running regular scans. I expect it won't be long before the company issues an update that scrubs macOS clean of this pesky, but otherwise stagnant malware.
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
*Terms Apply
Malware — short for malicious software — refers to programs specifically engineered to compromise computers or other devices. Malware can present itself in many forms such as viruses, Trojan horses, worms, adware, ransomware and spyware. All forms of malware are designed to compromise the safety of your devices and the data stored on them. This might allow cybercriminals to access your personal data and, in some cases, use that data to commit identity theft.
Does this sound like something you want to avoid? You're not alone. Nobody wants malware on their computer. Learning to be proactive about your computer's security and having strong malware protection is a smart way to avoid a malware intrusion
Here's a look at a few red flags that can indicate a malware problem.
Possible signs of malware infection
The presence of malware sometimes is obvious, even though you might not know how it got on your device. A lot of people have no idea that malware has been installed until their computers or devices start acting abnormally.
Symptoms of malware may appear obvious or discrete. Knowing how to detect these dangerous intrusions can help you determine how to fix the issue.
You might notice changes to the behavior of your computer or device, such as strange ads or pop-up windows — even when you're not surfing the web. You may also notice unwanted changes to your browsers' behavior and changes to its homepage, a slower overall experience on your computer, and a sudden lack of storage space.
Google chrome 21 download for mac. Watch out for ads that pop up a few seconds after a webpage is done loading. These ads sometimes contain inappropriate content. They might display flashing colors and be difficult to close, while blocking what you're trying to view.
How did I get malware?
Malware is usually installed unintentionally after the user has taken missteps.
For instance, malware can be installed accidentally by clicking on a malicious link and can be hidden or masked by other software. This often happens when you download content from unknown or untrustworthy sources. Seemingly harmless downloads, like screen savers, toolbars, and torrents, may be likely suspects.
Another reason you might find malware on your computer? It could be because your antivirus software or anti-malware software, operating systems, or other programs on your computer and other connected devices are out of date. Updating security features is just as important as having them in the first place, so you'll need to have the latest security protection in place. If you don't have quality antivirus or security software installed on your computer and devices, or if you don't keep it running the most recent security updates and virus definitions, you could be at risk of malware intrusion.
Malware protection: How to avoid malware
How To Find Malware On Mac Computer
Computer security should begin with strong, reliable antivirus and anti-malware software. It's smart to make this a priority on your home computer and any other devices you may have. Installing security software is one of the best things you can to do to avoid malware infections.
Be sure to run periodic diagnostic scans with your antivirus or anti-malware software. You can set it up so the program runs scans automatically during regular intervals. Configure your settings to run a malware detection scan at least once a week, preferably at night when the computer is less likely to be in use to avoid interruptions.
What else can you do? It's a good idea to be aware of your behavior online. Mac os right click. Personal education is one of your first lines of defense against malware.
For example, always be wary of emails from unknown sources — often called phishing emails. If your gut tells you something looks suspicious or unfamiliar, don't click on embedded links, documents, or photos.
Another tip: help keep your personal information safe with encryption. That's the process of helping protect personal data by using a 'secret code' to scramble the data you send and receive from your devices so that it can't be read by anyone who doesn't have the code key.
You can also use a firewall, either on the modem or each computer, and be sure to protect each of your online accounts with a unique, complex password.
Stay proactive with your cyber security and be vigilant while using the internet. These are some of the best ways to help ensure malware protection across your devices.
9 key features of strong anti-malware protection
Your second line of protection against malware is to install a strong anti-malware software program. That's because even if you're vigilant with robust passwords and cautious about your downloads, malware can sometimes still take hold. Even downloads from seemingly reputable websites or known senders could have malware embedded.
But it doesn't stop there. All security software products are not created the same. Different anti-malware programs protect at different levels, and free malware protection is often inadequate. Here are a few of our top recommendations for features to look for when deciding on the right anti-malware security software for your needs.
1. Regular program checks
A key feature of any anti-malware software you consider should be that it runs checks on all newly downloaded programs to ensure they don't contain viruses or other types of malicious software. One form of malware is ransomware, which can allow a cybercriminal to encrypt and steal the data stored on your device. Cybercriminals may demand a ransom to decrypt and restore access your device; however, there's no guarantee you'll get your data back, even if you pay the ransom.
How do you get ransomware? You may install ransomware unwittingly by downloading a program you thought was safe, or clicking on a link embedded with malware.
2. Computer scans
Robust anti-malware software such as Norton Security will run regular, scheduled scans across your whole computer. These scans will help provide an additional layer of protection against malware harming your system by checking for infections on a regular basis. If you do end up with a virus, you can use the free Norton Power Eraser to help remove malware.
3. Software updates
Common types of malware you can encounter on Mac are: Spyware and keyloggers – steal the user's personal information. Backdoor infections – remotely take control of your computer. Botnet – alters Mac into a shadow bot.
Protect your Mac from malware. MacOS has many features that help protect your Mac and your personal information from malicious software, or malware. One common way malware is distributed is by embedding it in a harmless-looking app. You can reduce this risk by using software only from reliable sources. Common types of malware you can encounter on Mac are: Spyware and keyloggers – steal the user's personal information. Backdoor infections – remotely take control of your computer. Botnet – alters Mac into a shadow bot. RELATED: Mac OS X Isn't Safe Anymore: The Crapware / Malware Epidemic Has Begun Malwarebytes makes well-regarded security utilities for Windows. Malwarebytes originally expanded into the Mac security software arena by purchasing and rebranding a popular application named 'Adware Medic' that we and others have used successfully in the past.
As Red Canary's Tony Lambert writes:
'..the ultimate goal of this malware is a mystery. We have no way of knowing with certainty what payload would be distributed by the malware, if a payload has already been delivered and removed, or if the adversary has a future timeline for distribution. Based on data shared with us by Malwarebytes, the nearly 30,000 affected hosts have not downloaded what would be the next or final payload.'
Click on over to Red Canary's blog if you want to get into the nitty-gritty technical details of Silver Sparrow. If you're curious about whether you've been infected, odds are you haven't, nor will you be going forward—Apple has suspended the developer certificates used to sign the package files that start the infection, meaning that Mac users will be unable to install it if they're using the Mac's default security settings. (I haven't found said malware, so I can't verify whether your Mac will warn you about not installing it, or simply mark it as a malicious app and forbid you from doing so.)
Nevertheless, if you're concerned that you might have been infected, think about what you've done with your system lately. Were you prompted by a website to download a software package and/or update? Was it something you weren't intending to download or install until a website suggested you should? Was said package file named something simple and dull, like 'update.pkg' or 'updater.pkg?'
If so, a little suspicion is warranted. While there's no real way to detect whether said malware is on your system based on observable behavior—since it's not doing anything at the moment, and it's unclear if it ever will—you can go hunting around for files the malware drops on your system. Red Canary notes four files that suggest your system may be infected:
- ~/Library/._insu (empty file used to signal the malware to delete itself)
- /tmp/agent.sh (shell script executed for installation callback)
- /tmp/version.json (file downloaded from from S3 to determine execution flow)
- /tmp/version.plist (version.json converted into a property list)
This lengthy (and incredibly helpful) writeup from Ars Technica commenter effgee will help you find the offending files, confirm they're problematic, and remove them. Since Malwarebytes worked with Red Canary on detection data for its analysis and published piece, odds are good that using the free version of that popular anti-malware scanner/remover should be sufficient, too.
If the current version of the app doesn't find and remove Silver Sparrow, make sure you keep its definitions updated—and that you're running regular scans. I expect it won't be long before the company issues an update that scrubs macOS clean of this pesky, but otherwise stagnant malware.
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
*Terms Apply
Malware — short for malicious software — refers to programs specifically engineered to compromise computers or other devices. Malware can present itself in many forms such as viruses, Trojan horses, worms, adware, ransomware and spyware. All forms of malware are designed to compromise the safety of your devices and the data stored on them. This might allow cybercriminals to access your personal data and, in some cases, use that data to commit identity theft.
Does this sound like something you want to avoid? You're not alone. Nobody wants malware on their computer. Learning to be proactive about your computer's security and having strong malware protection is a smart way to avoid a malware intrusion
Here's a look at a few red flags that can indicate a malware problem.
Possible signs of malware infection
The presence of malware sometimes is obvious, even though you might not know how it got on your device. A lot of people have no idea that malware has been installed until their computers or devices start acting abnormally.
Symptoms of malware may appear obvious or discrete. Knowing how to detect these dangerous intrusions can help you determine how to fix the issue.
You might notice changes to the behavior of your computer or device, such as strange ads or pop-up windows — even when you're not surfing the web. You may also notice unwanted changes to your browsers' behavior and changes to its homepage, a slower overall experience on your computer, and a sudden lack of storage space.
Google chrome 21 download for mac. Watch out for ads that pop up a few seconds after a webpage is done loading. These ads sometimes contain inappropriate content. They might display flashing colors and be difficult to close, while blocking what you're trying to view.
How did I get malware?
Malware is usually installed unintentionally after the user has taken missteps.
For instance, malware can be installed accidentally by clicking on a malicious link and can be hidden or masked by other software. This often happens when you download content from unknown or untrustworthy sources. Seemingly harmless downloads, like screen savers, toolbars, and torrents, may be likely suspects.
Another reason you might find malware on your computer? It could be because your antivirus software or anti-malware software, operating systems, or other programs on your computer and other connected devices are out of date. Updating security features is just as important as having them in the first place, so you'll need to have the latest security protection in place. If you don't have quality antivirus or security software installed on your computer and devices, or if you don't keep it running the most recent security updates and virus definitions, you could be at risk of malware intrusion.
Malware protection: How to avoid malware
How To Find Malware On Mac Computer
Computer security should begin with strong, reliable antivirus and anti-malware software. It's smart to make this a priority on your home computer and any other devices you may have. Installing security software is one of the best things you can to do to avoid malware infections.
Be sure to run periodic diagnostic scans with your antivirus or anti-malware software. You can set it up so the program runs scans automatically during regular intervals. Configure your settings to run a malware detection scan at least once a week, preferably at night when the computer is less likely to be in use to avoid interruptions.
What else can you do? It's a good idea to be aware of your behavior online. Mac os right click. Personal education is one of your first lines of defense against malware.
For example, always be wary of emails from unknown sources — often called phishing emails. If your gut tells you something looks suspicious or unfamiliar, don't click on embedded links, documents, or photos.
Another tip: help keep your personal information safe with encryption. That's the process of helping protect personal data by using a 'secret code' to scramble the data you send and receive from your devices so that it can't be read by anyone who doesn't have the code key.
You can also use a firewall, either on the modem or each computer, and be sure to protect each of your online accounts with a unique, complex password.
Stay proactive with your cyber security and be vigilant while using the internet. These are some of the best ways to help ensure malware protection across your devices.
9 key features of strong anti-malware protection
Your second line of protection against malware is to install a strong anti-malware software program. That's because even if you're vigilant with robust passwords and cautious about your downloads, malware can sometimes still take hold. Even downloads from seemingly reputable websites or known senders could have malware embedded.
But it doesn't stop there. All security software products are not created the same. Different anti-malware programs protect at different levels, and free malware protection is often inadequate. Here are a few of our top recommendations for features to look for when deciding on the right anti-malware security software for your needs.
1. Regular program checks
A key feature of any anti-malware software you consider should be that it runs checks on all newly downloaded programs to ensure they don't contain viruses or other types of malicious software. One form of malware is ransomware, which can allow a cybercriminal to encrypt and steal the data stored on your device. Cybercriminals may demand a ransom to decrypt and restore access your device; however, there's no guarantee you'll get your data back, even if you pay the ransom.
How do you get ransomware? You may install ransomware unwittingly by downloading a program you thought was safe, or clicking on a link embedded with malware.
2. Computer scans
Robust anti-malware software such as Norton Security will run regular, scheduled scans across your whole computer. These scans will help provide an additional layer of protection against malware harming your system by checking for infections on a regular basis. If you do end up with a virus, you can use the free Norton Power Eraser to help remove malware.
3. Software updates
With new types of malware surfacing regularly, it's critical that your anti-malware program can be configured to run updates automatically. These updates will equip your devices with the latest patches to recognize and protect against new threats.
4. Scans of suspicious websites
Your anti-malware software should detect and flag suspicious websites. For example, some fake websites are specifically designed to look like real sites with the goal of phishing, or tricking you into sharing your passwords or account numbers.
5. Spam-filtering technology
A strong anti-malware program should use email spam-filtering technology to help protect against suspicious messages that try to entice a user to click on malicious links. Part of this filtering involves isolating these potentially malicious emails in quarantine, which then allows you to determine if those messages are safe.
Check For Malware On Mac
6. Heuristics
Another form of anti-malware analysis is known as heuristics. Heuristics can spot malware by looking at its behavior and characteristics as opposed to relying only on its knowledge of malware definitions, or signatures. Heuristics can provide an extra layer of security by enabling an anti-malware program to detect and eradicate threats that were not detected in prior scans.
7. Sandboxing
If your security software detects a potentially-malicious program, it can perform a test by running that program in a protected, enclosed space on your computer known as a sandbox. If the suspicious program is determined to be malicious, your anti-malware software should be capable of removing it.
8. Password and account management
Another key feature you should look for in a strong anti-malware software is safeguarding your online account information. Password management tools will help ensure your passwords are strong — and that you aren't neglectful in creating them. Some password managers will also help you create passwords that are unique and complex, and then store them — along with sensitive data such as your credit card or other account information — in an encrypted online vault.
9. Usability
An anti-malware program's usability is a less obvious but important feature. Antivirus software programs should be easy to install and use. If the process is difficult, you might not install them correctly or use them regularly and effectively.
Cybercriminals have many reasons for attempting to install malware on unsuspecting devices, such as accessing your personal information, passwords, banking credentials, and other private data. What can you do to help protect yourself? Be vigilant in your online activity. Install reputable anti-malware security software. These are important proactive steps you can take that can help secure your devices, reputation, finances, and identity.
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
*Terms Apply
Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.
No one can prevent all identity theft or cybercrime. Not all products, services and features are available on all devices or operating systems. System requirement information on norton.com.
*Important Subscription, Pricing and Offer Details:
- The price quoted today may include an introductory offer. After that, your membership will automatically renew and be billed at the applicable monthly or annual renewal price found here.
- You can cancel your subscription at my.norton.com or by contacting Member Services & Support. For more details, please visit the Refund Policy.
- Your subscription may include product, service and /or protection updates and features may be added, modified or removed subject to the acceptance of the Customer Agreement.
The number of supported devices allowed under your plan are primarily for personal or household use only. Not for commercial use. If you have issues adding a device, please contact Member Services & Support.
§ Dark Web Monitoring in Norton 360 plans defaults to monitor your email address only. Please login to the portal to review if you can add additional information for monitoring purposes.