Popular BitTorrent Client Transmission Gets Infected With Malware AgainChristina Warren8/30/16 4:00pmFiled to: Not AgainMalwareTransmissionBitTorrentMac AppsOS X509EditPromoteShare to KinjaToggle Conversation toolsGo to permalink For the second time in five months, the Transmission BitTorrent client for Mac has been infected with malware. Advertisement The malware, dubbed OSX/Keydnap, is pretty nasty. Itās designed to steal the contents of the OS X system keychain and maintain a permanent backdoor. And for a few hours, that malware found its way into the popular Mac BitTorrent client, Transmission.From the researchers at ESET who discovered the malware: Advertisement During the last hours, OSX/Keydnap was distributed on a trusted website, which turned out to be āsomething elseā. It spread via a recompiled version of the otherwise legitimate open source BitTorrent client application Transmission and distributed on their official website.The good news is that āwithin minutesā of being notified that a rogue version of Transmission was discovered, the Transmission team removed the file from its web server. The bad news is that itās unclear how long the rogue version of Transmission was available or how many people could have downloaded the file. The malware-infected version of Transmission has a digital signature of Aug. 28, so ESET is advising anyone who downloaded Transmission 2.92 between Aug. 28-29 that their systems might be compromised. Sponsored If you think you might be affected, check for the existence of any of these files or directories:/Applications/Transmission.app/Contents/Resources/License.rtf/Volumes/Transmission/Transmission.app/Contents/Resources/License.rtf$HOME/Library/Application Support/com.apple.iCloud.sync.daemon/icloudsyncd$HOME/Library/Application Support/com.apple.iCloud.sync.daemon/process.id$HOME/Library/LaunchAgents/com.apple.iCloud.sync.daemon.plist/Library/Application Support/com.apple.iCloud.sync.daemon/$HOME/Library/LaunchAgents/com.geticloud.icloud.photo.plistIf you see this stuff, ESET says it means that the malicious version of Transmission was executed and that āKeydnap is most likely running.ā Advertisement Advertisement If youāve got OSX/Keydnap running on your system, you can remove it by either running a virus scan from a trusted antivirus app like Norton AntiVirus or ESET CyberSecurity. There is also a gist on GitHub that you can run via OS Xās terminal to delete the malware.This would be a bad situation for any application. Itās just a bad look for your app to spread malware. But in this case, itās even worse because this is the second time Transmission has been hijacked in less than six months. You may recall that in March, a rogue version of Transmission was bundled with ransomware. Even worse, ESET says the way the bad guys injected the malware into the app was the same as last time. Advertisement In both cases, a malicious block of code is added to the main function of the Transmission application. The code responsible for dropping and running the malicious payload is astonishingly the same.Just like in the KeRanger case, a legitimate code signing key was used to sign the malicious Transmission application bundle. Itās different from the legitimate Transmission certificate, but is still signed by Apple and bypasses Gatekeeper protection.In other words, not only was the malware attached to a file served from an official project website, it was code-signed by Apple so it could bypass OS Xās Gatekeeper protection. Advertisement Itās not clear what is happening with Transmission, but at this point, I donāt feel super comfortable recommending users use the software, at least, on the Mac. Itās not acceptable for a major applicationāopen source or notāto get hijacked this way twice in under six months.If the Transmission team is committed to its users, it will do a full security audit of all of its web servers and source control systems. The fact that the vector for attack was the same as last time seems to paint the picture of a project that either doesnāt know what itās doing from a technical level, or simply doesnāt care. Weāve reached out to Transmission for comment. Advertisement [We Live Security via MacRumors]Recommended StoriesYes, Ransomware Can Affect Macs TooMore FakeĀ PokĆ©mon Go AppsĀ Were Released To Ruin Your PhoneHow to Make Sure Your Torrent Client Isn't Secretly Mining BitcoinChristina Warrenchristina.warren@gizmodo.com@film_girlChristina is a senior writer at Gizmodo.PGP Fingerprint: E37D B179 06A2 0DB3 CB19 8F4D ABA8 5C28 322E D770|PGP KeyReply50 repliesLeave a reply