OSX/Dok: macOS Malware That Hijacks Network Traffic Using Proxy Redirection

OSX/Dok is a macOS malware first discovered in 2017, designed to intercept and monitor all encrypted network traffic by installing a malicious proxy configuration and custom root certificate. It spreads through phishing campaigns using fake document themes, tricking users into granting system-level permissions. OSX/Dok was one of the first examples of malware that could bypass macOS Gatekeeper protections and achieve full control over a Mac’s network communications.

Introduction to OSX/Dok

OSX/Dok masquerades as a legitimate file or installer, often with misleading names related to taxes, government, or shipping. Once installed, it gains administrative privileges, installs a man-in-the-middle (MitM) setup, and routes all web traffic through a proxy controlled by the attacker. This allows the malware to spy on emails, banking logins, or any HTTPS traffic — even if it's encrypted.


1. How OSX/Dok Works

Infection Mechanism:
OSX/Dok is delivered via:

Payload Execution:
Once active, OSX/Dok:


2. History and Notable Campaigns

Origin and Discovery:
OSX/Dok was first identified by Check Point researchers in April 2017. It was notable for being signed with a valid Apple developer certificate, allowing it to bypass macOS Gatekeeper at the time.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing OSX/Dok Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing OSX/Dok

Indicators of Compromise (IoCs):

Removal Steps:

  1. Reboot into Safe Mode
  2. Remove unknown launch agents and persistence mechanisms
  3. Delete the rogue certificate from Keychain Access
  4. Reset proxy settings manually in System Preferences > Network
  5. Run a malware scan to confirm full removal

Professional Help:
If sensitive data was accessed or if the infection occurred on a corporate device, contact incident response professionals for full remediation.


7. Response to a OSX/Dok Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
OSX/Dok’s man-in-the-middle behavior may lead to serious privacy violations, and infections involving credential theft could trigger breach reporting requirements. Legal implications also extend to any abuse of developer certificates.

Ethical Considerations:
The malware exploited users' trust in signed apps and macOS’s perceived safety, showing how technical legitimacy can be weaponized. It blurred the line between surveillance and outright theft by intercepting private communications.


9. Resources and References


10. FAQs about OSX/Dok

Q: What is OSX/Dok malware?
A macOS trojan that intercepts network traffic using a rogue certificate and proxy setup.

Q: How does it infect systems?
Through phishing emails with malicious ZIP files or disguised installers.

Q: What does it do once installed?
Reroutes encrypted traffic through attacker-controlled servers to monitor user activity.

Q: Can it be removed?
Yes, but it requires removing launch agents, restoring proxy settings, and deleting the malicious certificate.


11. Conclusion

OSX/Dok was one of the first macOS malware families to hijack encrypted traffic at scale, using trusted certificates and proxy manipulation to steal user data. It demonstrated that macOS users are not immune from sophisticated social engineering and that signed malware can still be dangerous when users grant elevated privileges. Awareness, system hygiene, and monitoring of hidden settings are key to preventing threats like this from taking hold.

 

 

« Back to the Virus Information Library

« Back to the Security Center