S0163 Janicab
Janicab is an OS X trojan that relied on a valid developer ID and oblivious users to install it. 1
| Item | Value |
|---|---|
| ID | S0163 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.1 |
| Created | 14 December 2017 |
| Last Modified | 19 March 2020 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1123 | Audio Capture | Janicab captured audio and sent it out to a C2 server.21 |
| enterprise | T1053 | Scheduled Task/Job | - |
| enterprise | T1053.003 | Cron | Janicab used a cron job for persistence on Mac devices.1 |
| enterprise | T1113 | Screen Capture | Janicab captured screenshots and sent them out to a C2 server.21 |
| enterprise | T1553 | Subvert Trust Controls | - |
| enterprise | T1553.002 | Code Signing | Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions.1 |