The development, reported by the MalwareHunterTeam over the weekend, appears to be the first time a big-game ransomware crew has created a macOS-based payload.
Additional samples identified by vx-underground show that the macOS variant has been available since November 11, 2022, and has managed to evade detection by anti-malware engines until now.
LockBit is a prolific cybercrime crew with ties to Russia that has been active since late 2019, with the threat actors releasing two significant updates to the locker in 2021 and 2022.
According to statistics released by Malwarebytes last week, LockBit emerged as the second most used ransomware in March 2023 after Cl0p, accounting for 93 successful attacks.
An analysis of the new macOS version (“locker_Apple_M1_64″_ reveals that it’s still a work in progress, relying on an invalid signature to sign the executable. This also means that Apple’s Gatekeeper protections will prevent it from being run even if it’s downloaded and launched on a device.
The payload, per security researcher Patrick Wardle, packs in files like autorun.inf and ntuser.dat.log, suggesting that the ransomware sample was initially designed to target Windows.
Some additional safeguards implemented by Apple are sometimes preventing ransomware encryption, such as System Integrity Protection (SIP) and Transparency, Consent, and Control (TCC), that prevent the execution of unauthorized code and require apps to seek users’ permission to access protected files and data.
This means that without an exploit or explicit user-approval user, files will remain protected. Still, an additional layer or detection/protection may be warranted.
The findings, despite the artifacts’ overall bugginess, are a definite sign that threat actors are increasingly setting their sights on macOS systems.