Proton is a macOS backdoor focusing on data theft and credential access [1].
Proton modifies the tty_tickets line in the sudoers file.[1]
Proton zips up files before exfiltrating them.[1]
Proton uses macOS' .command file type to script actions.[1]
Proton persists via Launch Agent.[1]
Proton gathers credentials in files for keychains.[1]
Proton gathers credentials for Google Chrome.[1]
Proton gathers credentials in files for 1password.[1]
Proton uses an encrypted file to store commands and configuration values.[1]
Proton kills security tools like Wireshark that are running.[1]
Proton removes logs from /var/logs and /Library/logs.[1]
/var/logs
/Library/logs
Proton removes all files in the /tmp directory.[1]
Proton uses a keylogger to capture keystrokes.[1]
Proton prompts users for their credentials.[1]
Proton uses VNC to connect into systems.[1]
Proton captures the content of the desktop with the screencapture binary.[1]