If you are a tech-savvy user, the name probably does not make much sense to you since executable files cannot run on Mac, since they’re especially designed for Windows.
And yet, hackers have found a smart way to employ the present technology to add support for EXE files on a Mac to be able to really infect these devices.
Security vendor Malware Brains has found a new strategy that comes down to a DMG file that packs this kind of executable file, which is then utilised to deploy additional malicious payloads on the target system.
The DMG file is supposed to put in a firewall application for macOS called Little Snitch, so when attempting to deploy the safety applications, users also launch the EXE file.
Because executable files cannot run on macOS by default, the malware writers also contained a copy of Mono, a free frame which makes this item possible.
So essentially, when launching the DMG file to set up Little Snitch, the executable file can be launched using the stated framework.
The reason hackers switched to these approaches is that executable files are not confirmed by Gatekeeper, the built-in macOS safety feature that scans DMG files to be certain they’re signed and therefore protected.
Deploying adware presently, running EXE on other programs might have a larger impact on non-Windows systems like MacOS.
Usually, a mono frame installed in the system must load or compile executables and libraries, they state in an analysis of this malware.
In this instance, however, the bundling of these documents with the stated framework becomes a workaround to bypass the systems given EXE isn’t a recognized binary executable by MacOS’ safety features.
In terms of the native library differences between Windows and MacOS, mono frame supports DLL mapping to encourage Windows-only dependencies for their MacOS counterparts.
The best way to stay protected is to refrain from downloading documents from unverified sources and to install security software that can secure your device.