Known unknowns – detecting rootkits under OS X

A rootkit is a piece of malicious software which has the advanced capability of hiding itself on an infected system. This is usually done by hooking system functions. For example a rootkit could be used to hide files from the user by hooking functions responsible for listing the contents of a directory. Rootkits are frequently used in combination with other malware, which it hides from users and security products. The number of malware families that have rootkit capabilities and target Microsoft’s Windows systems is well into double figures.

We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right now: We know that we don’t know. We do know that various websites and even paperback books [1, 2] document how rootkits can work under OS X. We have seen OS X malware using rootkit techniques in the past. The most notable example being OSX/Morcut also called Crisis by other vendors. This malware was used to steal information from infected Macs and loaded a kernel extension so as to hide its files from the victim.

Detecting a rootkit under OS X currently involves dumping and analyzing kernel memory. It requires time and knowledge. It is not something accessible to everyone.
ERD_screenshot_infectedPNGToday, ESET is releasing a simple tool to detect rootkits on OS X. This tool, named ESET Rootkit Detector, can be downloaded from the following URL: The tool aims to detect modifications in the OS X kernel memory that might indicate the presence of a rootkit. Its usage is very simple, a user only needs to download and run the application. Since a kernel extension is needed to detect modifications to kernel memory, the user will be prompted for Administrator privileges. After a couple of seconds of scanning, the result is displayed to the user.

If a malicious module is found, you have the option to send a report to ESET and we would appreciate people doing that. We need your help to become better acquainted with what we don’t already know. Our team of reverse engineers will go through the submitted files and make sure users are properly protected if a new threat is discovered.
ERD_screenshot_prescanBear in mind that this tool is still in beta stage so we do not recommend running it on critical production equipment. On the other hand, we would love to have as many people as possible try it and work with it. This would allow us to see how well our new technology is working and, if something is found, this will be great research material to enable us to better track and document rootkits targeting the OS X platform. We always need to know more about the unknowns.

[1] Charlie Miller, Dino Dai Zovi, The Mac Hacker’s Handbook, March 2009, ISBN: 0470395362
[2] Paul Baccas, Kevin Finisterre, Larry H., David Harley, Gary Porteous, OS X Exploits and Defense, Elsevier 2008, ISBN: 978-1-59749-254-6

Author , ESET

  • Ravi

    I don’t have a OS X but i will recommend it to my friends…

    • Marc-Etienne M.Léveillé


  • LindaClaudine

    Thanks! I have been the victim of what I believe to be a rootkit. And my roommate runs an out of date (I discovered) PC with XP! Now, my iPhone and MacBook Pro (as well as our router) is infected for the second time! Though my 3 year contract with Apple for my MB is up, I still have a case open on this – which keeps the protection going.

    • Maloos

      Have you checked your Microwave?! it’s listening in on port 443!

      • I can’t hear above all the spam from my fridge.

        • LindaClaudine

          I don’t have a microwave. But I do have a career that began in the punch card & Mag Card I era, 17 years at one of the largest law firms in the world, a minor in Math, extensive experience in and understanding of our political system and the ability to see relationships, realize history repeats, and the knowledge that corporations have more power than any government: all the (increasing) rights of personhood with none of the responsibilities. Everyone has something of interest to impart, all aspects on Earth are connected in some fashion, and black and white are theoretical as in fact there are infinite shades of gray. AND: don’t care how you vote – JUST DO. PLS!

Follow us

Copyright © 2017 ESET, All Rights Reserved.