Around is the new floating head video chat multitasking app

You have to actually get work done, not just video call all day, but apps like Zoom want to take over your screen. Remote workers who need to stay in touch while staying productive are forced to juggle tabs. Meanwhile, call participants often look and sound far away, dwarfed by their background and drowned in noise.

Today, Around launches its new video chat software that crops participants down to just circles that float on your screen so you have space for other apps. Designed for laptops, Around uses auto-zoom and noise cancelling to keep your face and voice in focus. Instead of crowding around one computer or piling into a big-screen conference room, up to 15 people can call from their own laptop without echo — even from right next to each other.

“Traditional videoconferencing tries to maximize visual presence. But too much presence gets in the way of your work,” says Around CEO Dominik Zane. “People want to make eye contact. They want to connect. But they also want to get stuff done. Around treats video as the means to an end, not the end in itself.”

Around becomes available today by request in invite-only beta for Mac, windows, Linux, and web. It’s been in private beta since last summer, but now users can sign up here for early access to Around. The freemium model means anyone can slide the app into their stack without paying at first.

After two years in stealth, Around’s 12-person distributed team reveals that it’s raised $5.2 million in seed funding over multiple rounds from Floodgate, Initialized Capital, Credo Ventures, AngelList’s Naval Ravikant, Product Hunt’s Ryan Hoover, Crashlytics’ Jeff Seibert, and angel Tommy Leep. The plan is to invest in talent and infrastructure to keep video calls snappy.

Not Just A Picturephone

Around CEO Dominik Zane

Around was born out of frustration with remote work collaboration. Zane and fellow Around co-founder Pavel Serbajlo had built mobile marketing company M.dot that was acquired by GoDaddy by using a fully distributed team. But they discovered that Zoom was “built around decades-old assumptions of what a video call should be” says Zane. “A Zoom video call is basically a telephone connected to a video camera. In terms of design, it’s not much different from the original Picturephone demoed at the 1964 World’s Fair.”

So together, they started Around as a video chat app that slips into the background rather than dominating the foreground. “We stripped out every unnecessary pixel by building a real-time panning and zooming technology that automatically keeps callers’ faces–and only their faces–in view at all times” Zane explains. It’s basically Facebook Messenger’s old Chat Heads design, but for the desktop enterprise.

Calls start with a shared link or /Around Slack command. You’re never unexpectedly dumped into a call, so you can stay on task. Since participants are closely cropped to their faces and not blown up full screen, they don’t have to worry about cleaning their workspace or exactly how their hair looks. That reduces the divide between work-from-homers and those in the office.

As for technology, Around’s “EchoTerminator” uses ultrasonic audio to detect nearby laptops and synchronization to eliminate those strange feedback sounds. Around also employs artificial intelligence and the fast CPUs of modern laptops to suppress noise like sirens, dog barks, washing machines, or screaming children. A browser version means you don’t have to wait for people to download anything, and visual emotes like “Cool idea” pop up below people’s faces so they don’t have to interrupt the speaker.

Traditional video chat vs Around

“Around is what you get when you rethink video chat for a 21st-century audience, with 21st-century technology,” says Initialized co-founder and general partner Garry Tan. “Around has cracked an incredibly difficult problem, integrating video into the way people actually work today. It makes other video-call products feel clumsy by comparison.”

There’s one big thing missing from Around: mobile. Since it’s meant for multitasking, it’s desktop/laptop only. But that orthodoxy ignores the fact that a team member on the go might still want to chime in on chats, even with just audio. Mobile apps are on the roadmap, though, with plans to allow direct dial-in and live transitioning from laptop to mobile. The 15-participant limit also prevents Around from working for all-hands meetings.

Competing with video calling giant Zoom will be a serious challenge. Nearly a decade of perfecting its technology gives Zoom super low latency so people don’t talk over each other. Around will have to hope that its smaller windows let it keep delays down. There’s also other multitask video apps like Loom’s asynchronously-recorded video clips that prevent distraction.

With coronavirus putting a new emphasis on video technology for tons of companies, finding great engineers could be difficult. “Talent is scarce, and good video is hard tech. Video products are on the rise. Google and large companies snag all the talent, plus they have the ability and scale to train audio-video professionals at universities in northern Europe” Zane tells me. “Talent wars are the biggest risk and obstacle for all real-time video companies.”

But that rise also means there are tons of people fed up with having to stop work to video chat, kids and pets wandering into their calls, and constantly yelling at co-workers to “mute your damn mic!” If ever there was a perfect time to launch Around, it’s now.

“Eight years ago we were a team of locals and immigrants, traveling frequently, moving between locations and offices” Zane recalls. “We realized that this was the future of work and it’s going to be one of the most significant transformations of modern society over the next 30 years . . . We’re building the product we’ve wanted for ourselves.”

One of the best things about working remotely is you don’t have colleagues randomly bugging you about superfluous nonsense. But the heaviness of traditional video chat swings things too far in the other direction. You’re isolated unless you want to make a big deal out of scheduling a call. We need presence and connection, but also the space to remain in flow. We don’t want to be away or on top of each other. We want to be around.

Big opening for startups that help move entrenched on-prem workloads to the cloud

AWS CEO Andy Jassy showed signs of frustration at his AWS re:Invent keynote address in December.

Customers weren’t moving to the cloud nearly fast enough for his taste, and he prodded them to move along. Some of their hesitation, as Jassy pointed out, was due to institutional inertia, but some of it also was due to a technology problem related to getting entrenched, on-prem workloads to the cloud.

When a challenge of this magnitude presents itself and you have the head of the world’s largest cloud infrastructure vendor imploring customers to move faster, you can be sure any number of players will start paying attention.

Sure enough, cloud infrastructure vendors (ISVs) have developed new migration solutions to help break that big data logjam. Large ISVs like Accenture and Deloitte are also happy to help your company deal with migration issues, but this opportunity also offers a big opening for startups aiming to solve the hard problems associated with moving certain workloads to the cloud.

Think about problems like getting data off of a mainframe and into the cloud or moving an on-prem data warehouse. We spoke to a number of experts to figure out where this migration market is going and if the future looks bright for cloud-migration startups.

Cloud-migration blues

It’s hard to nail down exactly the percentage of workloads that have been moved to the cloud at this point, but most experts agree there’s still a great deal of growth ahead. Some of the more optimistic projections have pegged it at around 20%, with the U.S. far ahead of the rest of the world.

Chinese cloud infrastructure market generated $3.3B in Q42019

Research firm Canalys reports that the Chinese cloud infrastructure market grew 66.9% to $3.3 billion in the last quarter of 2019, right before the COVID-19 virus hit the country. China is the second largest cloud infrastructure market in the world, with 10.8% share.

The quarter puts the Chinese market on a $13.2 billion run rate. Canalys pegged the U.S. market at $14 billion for the same time period, with a 47% worldwide market share.

Alibaba led the way in China, with more than 46% market share. Like its American e-commerce giant counterpart, Amazon, Alibaba has a cloud arm, and it dominates in its country much the same way AWS does in the U.S.

Tencent was in second, with 18%, roughly the equivalent of Microsoft Azure’s share in the U.S., and Baidu AI Cloud came in third, with 8.8%, roughly the equivalent of Google’s U.S. market share.

Slide: Canalys

Matthew Ball, an analyst at Canalys, says the fourth quarter numbers predate the medical crisis due to the COVID-19 outbreak in China. “In terms of growth drivers for Q4, we have seen the ongoing demand for on-demand compute and storage accelerate throughout 2019, as private and public organizations embark on digital transformation projects and start building platforms and applications to develop new services.”

Ball says gaming was a big cloud customer, as was healthcare, finance, transport and industry. He also pointed to growth in facial recognition technology as part of the smart city sector.

As for next year, Ball says the firm still sees big growth in the market despite the virus impact in Q12020. “In addition to the continuation of digital projects once business returns to normality, we anticipate many businesses new to using cloud services during the crisis will continue use and become paying customers,” he said. The cloud companies have been offering a number of free options to businesses during the crisis.

“The overall outcome of current events around the world will be that companies will assess their business continuity measures and make sure they can continue to operate if events are ever repeated,” he said.

Torch & Everwise merge into affordable exec coaching for all

While companies might pay for a CEO coach, lower level employees often get stuck with lame skill-building worksheets or no mentorship at all. Not only does that limit their potential productivity, but it also makes them feel stagnated and undervalued, leading them to jump ship.

Therapy… err… executive coaching is finally becoming destigmatized as entrepreneurs and their teams realize that everyone can’t be crushing it all the time. Building a business is hard. It’s okay to cry sometimes. But the best thing you can do is be vulnerable and seek help.

Torch emerged from stealth last year with $18 million in funding to teach empathy to founders and C-suite execs. Since 2013, Everwise has raised $26 million from Sequoia and others for its peer-to-peer mentorship marketplace that makes workplace guidance accessible to rank-and-file staffers. Tomorrow they’ll official announce their merger under the Torch name to become a full-stack career coach for every level of employee.

“As human beings, we face huge existential challenges in the form of pandemics, climate change, the threats coming down the pipe from automation and AI” says Torch co-founder and CEO Cameron Yarbrough. “We need to create leaders at every single level of an organization and ignite these people with tools and human support in order to level up in the world.”

Startup acquisitions and mergers can often be train wrecks because companies with different values but overlapping products are jammed together. But apparently it’s gone quite smoothly since the products are so complementary, with all 70 employees across the two companies keeping their jobs. “Everwise is much more bottom up whereas Torch is about the upper levels, and it just sort of made sense” says Garry Tan, partner and co-founder of Initialized Capital that funded Torch’s Series A and is also a client of its coaching.

How does each work? Torch goes deep, conducting extensive 360-interviews with an executive as well as their reports, employees, and peers to assess their empathy, communication, vision, conflict resolution, and collaboration. Clients’ executives do extensive 360-interviews. It establishes quantifiable goals that executives work towards through video call sessions with Torch’s coaches. They learn about setting healthy workplace boundaries, staying calm amidst arguments, motivating staff without seeming preachy, and managing their own ego.

This coaching can be exceedingly valuable for the leaders setting a company’s strategy and tone. But the one-on-one sessions are typically too expensive to buy for all levels of employees. That’s where Everwise comes in.

Everwise goes wide, offering a marketplace with 6,000 mentors across different job levels and roles that can provide more affordable personal guidance or group sessions with 10 employees all learning from each other. It also provides a mentorship platform where bigger companies can let their more senior staffers teach junior employees exactly what it takes to succeed. That’s all stitched together with a curated and personalized curriculum of online learning materials. Meanwhile, a company’s HR team can track everyone’s progress and performance through its Academy Builder dashboard.

“We know Gen Z has grown up with mentors by their side from SAT prep” says Torch CMO Cari Jacobs. Everwise lets them stay mentored, even at early stages of their professional life. “As they advance through their career, they might notch up to more executive private coaching.” Post-merger, Torch can keep them sane and ambitious throughout the journey. 

“It really allows us to move up market without sacrificing all the traction we’ve built working with startups and mid-market companies,” Yarbrough tells me. Clients have included Reddit and ZenDesk, but also giants like Best Buy, Genentech, and T-Mobile.

The question is whether Everwise’s materials are engaging enough to not become just another employee handbook buried on an HR site that no one ever reads. Otherwise, it could just feel like bloat tacked onto Torch. Meanwhile, scaling up to bigger clients pits Torch against long-standing pillars of the executive coaching industry like Aon and Korn Ferry that have been around for decades and have billions in revenue. Meanwhile, new mental health and coaching platforms are emerging like BetterUp and Sounding Board.

But the market is massive since so few people get great coaching right now. “No one goes to work and is like, ‘Man, I wish my boss was less mindful,’” Tan jokes. When Yarbrough was his coach, the Torch CEO taught the investor that while many startup employees might think they thrive on flexibility, “people really want high love and high structure.” In essence, that’s what Torch is trying to deliver — a sense of emotional camaraderie mixed with a prod in the direction of fulfilling their destiny.

Addapptation snares $1.3M seed to build a better UX for Salesforce

Addapptation, a startup that wants to build a practical design layer on top of Salesforce and other enterprise tools, announced a $1.3 million seed investment today.

2048 Ventures led the round with participation from East Coast Angels, The Millworks II Fund and additional angel investors from New Hampshire, where the firm is located

Co-founder Sumner Vanderhoof says the startup’s goal is to build a user experience platform for enterprise tools like Salesforce . “Our goal is to help make simple, easy to use Salesforce.com solutions built on the addapptation UX platform.

“At the end of the day, we’re really helping transform the way companies work, making their employees more efficient, making the job they do easier and more consistent, so they have a bigger impact on the companies that they work for,” Vanderhoof told TechCrunch.

He says they do this by looking at the company workflow and what issue the customer is trying to solve — such as a problem converting deals through the sales cycle. They will then help build tools and an interface to make it easier to pinpoint this information with the goal of being able to reuse whatever solutions they create for other customers.

He says the platform is template-driven and designed to quickly go from idea to solution. A typical solution takes no longer than two weeks to build and implement. Once a customer is using addapptation, employees can log into the addapptation platform or it can be a layer built into Salesforce providing a more guided experience.

The company has built around 40 plug-ins for the platform, including a heat map that identifies where sales is likely to find the best opportunities to close a deal. The solutions they build are designed to work online or on mobile devices as needed.

Photo: addapptation

Vanderhoof says that the company has a good relationship with Salesforce, and it doesn’t compete directly with the company. “Their main focus is providing tools for a wide audience. Ours is extending the platform beyond what it can do,” he said.

The two founders, Vanderhoof and his wife Carla, took three years building the platform, essentially bootstrapping before taking today’s funding.  The company has 15 employees in its Exeter, NH, headquarters and has 20 customers including Comcast and Ingram Micro.

Spectro Cloud launches with $7.5M investment to help developers build Kubernetes clusters their way

By now we know that Kubernetes is a wildly popular container management platform, but if you want to use it, you pretty much have to choose between having someone manage it for you or building it yourself. Spectro Cloud emerged from stealth today with a $7.5 million investment to give you a third choice that falls somewhere in the middle.

The funding was led by Sierra Ventures with participation from Boldstart Ventures.

Ed Sim, founder at Boldstart, says he liked the team and the tech. “Spectro Cloud is solving a massive pain that every large enterprise is struggling with: how to roll your own Kubernetes service on a managed platform without being beholden to any large vendor,” Sim told TechCrunch.

Spectro co-founder and CEO Tenry Fu says an enterprise should not have to compromise between control and ease of use. “We want to be the first company that brings an easy-to-use managed Kubernetes experience to the enterprise, but also gives them the flexibility to define their own Kubernetes infrastructure stacks at scale,” Fu explained.

Fu says that the stack, in this instance, consists of the base operating system to the Kubernetes version to the storage, networking and other layers like security, logging, monitoring, load balancing or anything that’s infrastructure related around Kubernetes.

“Within an organization in the enterprise you can serve the needs of your various groups, down to pretty granular level with respect to what’s in your infrastructure stack, and then you don’t have to worry about lifecycle management,” he explained. That’s because Spectro Cloud handles that for you, while still giving you that control.

That gives enterprise developers greater deployment flexibility and the ability to move between cloud infrastructure providers more easily, something that is top of mind today as companies don’t want to be locked into a single vendor.

“There’s an infrastructure control continuum that forces enterprises into trade-offs against these needs. At one extreme, the managed offerings offer a kind of nirvana around ease of use, but it’s at the expense of control over things like the cloud that you’re on or when you adopt new ecosystem options like updated versions of Kubernetes.”

Fu and his co-founders have a deep background in this, having previously been part of CliQr, a company that helped customers manage applications across hybrid cloud environments. They sold that company to Cisco in 2016 and began developing Spectro Cloud last spring.

It’s early days, but the company has been working with 16 beta customers.

Coronavirus Widens the Money Mule Pool

With many people being laid off or working from home thanks to the Coronavirus pandemic, cybercrooks are almost certain to have more than their usual share of recruitable “money mules” — people who get roped into money laundering schemes under the pretense of a work-at-home job offer. Here’s the story of one upstart mule factory that spoofs a major nonprofit and tells new employees they’ll be collecting and transmitting donations for an international “Coronavirus Relief Fund.”

On the surface, the Web site for the Vasty Health Care Foundation certainly looks legitimate. It includes various sections on funding relief efforts around the globe, explaining that it “connects nonprofits, donors, and companies in nearly every country around the world.” The site says it’s a nonprofit with offices based in Nebraska and Quebec, Canada.

Vasty is a phony charity that pretends to raise money for Coronavirus victims but instead hires people to help launder stolen funds. This and the rest of the content at Vasty’s site was lifted from GlobalGiving, a legitimate charity that is helping people affected by the pandemic.

The “Vasty Health Care Foundation” is one of several fraudulent Web sites that recruit money mules in the name of helping Coronavirus victims. The content on Vasty’s site was lifted almost entirely from globalgiving.org, a legitimate charity that actually is trying to help people affected by the pandemic.

“We have been contacted by job seekers asking if we are related to some of these job opportunities they’ve been finding on Indeed.com and Monster.com,” said Kevin Conroy, chief product officer at GlobalGiving. “And we always tell them no that’s not from us, and not to cash any checks someone may be giving them in relation to those offers.”

The Vasty domain — vastyhealthcarefoundation[.]com — was registered just weeks ago, although the site claims its organization has been around for years.

The crooks behind this scheme also seem to have submitted the Vasty name in custom links at vetting sites like The Better Business Bureau and Guidestar that ultimately take one to a summary of data on GlobalGiving. No doubt this is part of an effort to lend legitimacy to the Vasty name (hovering over the links above reveals the trickery).

What proof is there that Vasty isn’t a legitimate charity? None of the dozens of Canadian mules contacted by this author responded to requests for comment. But KrebsOnSecurity received copious amounts of information about this scam from Milwaukee, Wisc. based Hold Security, which managed to intercept key file exchanges between threat actors through public file sharing services.

Among those files were a set of form letters and boilerplate email messages that describe the ideal candidate for the job at Vasty and welcome new recruits to the Vasty payroll. Here’s a look at part of the job description, which includes (not pictured) a description of the healthcare plans and other benefits allegedly offered to Vasty employees.

After congratulating applicants (everyone who applies is “hired”) on their new positions, Vasty asks the recruits to do some busy work. In this case, new hires are sent to local pharmacies on some bogus errand, such as to inspect the pricing of face masks and hand sanitizer products for price-gouging.

“Now we have the first task for you. You will have to perform a trip within your city. So that we can compensate for transportation costs along with your hourly rate, I ask you to keep receipts confirming your expenses.

LOCATION: Sam’s Geneva Street Pharmacy

ADDRESS:  284 Geneva St, St. Catharines, ON L2N 2E8

I ask you to go to the pharmacy at the specified address. We are increasingly receiving reports of private sellers violating the pricing policy for products such as: aspirin, face masks are loose surgical masks with elastic loops that go around the ears, hand sanitizers.”

New recruits are then asked to assemble and submit a written report of their observations at the store in question.

These types of menial, meaningless tasks are a typical tactic of money mule recruitment schemes and they serve two main purposes: They separate out slackers from people who really need and want a job, and they help the employee feel like he’s doing something useful and legitimate (aside from just moving money around, which if brought up too soon might make him question whether the job is legit).

Eventually, after successfully completing one or more of these busy work tasks, the new hire is asked to process a “donation” from someone who wants to help fight the Coronavirus outbreak:

“Please read the instructions carefully. One donor wants to make donations to help fight the coronavirus. As you know, this is a big problem for most countries of the world. Every day we receive information from the World Health Organization that more and more people are sick. Quite a lot of people died from this virus. Some people simply don’t have enough funds to provide themselves with standard face masks and disinfectants to fight the virus.”

“The donor requests that Bitcoins be bought with his funds. For this task, you need to create your Bitcoin wallet, or use the QR code that we send you in this letter. You will receive from the donor up to 3000 CAD. Your commission up to 150 CAD will be included in this amount to cover your expenses. I remind you that you do not need to use your funds to buy bitcoins. The funds will be sent to you. You will need to receive cash atm or at your bank branch.”

What happens next is the employee then receives an electronic transfer of money into his bank account, is asked to withdraw the cash, and to keep 150 Canadian dollars for himself. He’s then instructed to take the remainder of the funds to a Bitcoin ATM and scan an emailed QR code with his mobile phone. This causes the cash he deposits into the Bitcoin ATM to be sent in an irreversible transaction to a Bitcoin wallet controlled by the scammers.

What’s going on behind the scenes is the funds that get deposited in the employee’s account are invariably stolen from other hacked bank accounts, and the employee is merely helping the crooks launder the stolen money into a form of payment that can’t be reversed.

Another boilerplate email intercepted by Hold Security shows Vasty’s new hires manager offering advice to employees who are asked by nosey bank employees about the nature of the funds withdrawal.

“Important: If you receive any questions from the bank regarding the purpose of the payment, you can open part of the instructions if necessary and inform that these funds are intended for payment of medicines. In any case, it is a personal payment and it will not be taxed. However, I strongly recommend that you not divulge the rest of the instructions for paying for medicines against coronavirus so as not to aggravate panic among the population.”

Americans shouldn’t feel left out of the scam: Hold Security founder Alex Holden says his analysts also intercepted a nearly identical set of scam templates targeting job seekers in the United States.

Money mule scammers specialize in hacking employer accounts at job recruitment Web sites like Monster.com, Hotjobs.com and other popular employment search services. Armed with the employer accounts, the crooks are free to search through millions of resumes and reach out to people who are currently between jobs or seeking part-time employment.

If you receive a job solicitation via email that sounds too-good-to-be-true, it probably is related in some way to one of these money-laundering schemes. Even if you can’t see the downside to you, someone is likely getting ripped off. Also, know that money mules — however unwitting — may find themselves in hot water with local police, and may be asked by their bank to pay back funds that were illegally transferred into the mules’ account.

Overall, Holden said, established cybercriminals who specialize in recruiting and grooming money mules for financial crimes have been cooing of late over the potential glut of new mules. One mule vendor on a popular Russian-language crime forum posted Tuesday that his “drops” — the hacker slang term for money mules — weren’t scared of Coronavirus concerns.

“We got drops in masks!,” one vendor proclaimed.

“We continue to work despite the Coronavirus,” declared another drops vendor.

Any readers interested in helping others affected by the Coronavirus outbreak should consider giving through the organization Vasty is impersonating here; Global Giving. Alternatively, these two stories link to a number of other reputable organizations facilitating Coronavirus relief efforts.

How Offensive Actors Use AppleScript For Attacking macOS

When we think about security on macOS and the tools used by offensive actors, whether those are real in the wild attacks or red team exercises, we tend to think of things like python scripts, shell scripts, malicious documents, shady extensions and of course, the fake, doctored or trojan application bundle. There is much less attention in the security field on AppleScript – a built-in macOS technology – despite the fact it’s been around for as long as Python and predates macOS 10 itself by 8 or 9 years.

As I’ll show in this post, AppleScript is widely used by offensive actors. This includes its use in adware, its use for tasks such as persistence, anti-analysis, browser hijacking, spoofing and more. Worryingly, given the lack of attention paid to AppleScript in the research community, that is all without even leveraging some of AppleScript’s most powerful or unique features, some of which we’ll cover below (others I’ve written about before here).

Why Have the Good Guys Ignored AppleScript?

Unlike Bash and other shell languages, and unlike Python, a cross-platform, beginner-friendly scripting language that has achieved widespread adoption and praise, AppleScript is a language peculiar to macOS; not only can you NOT use it on other Desktop operating systems like Windows and Linux, you can’t even use it on Apple’s other operating systems like iOS and iPadOS.

As a language, AppleScript has a reputation for being quirky, slow and difficult to develop even simple scripts with. It’s quirky because it attempts to use “natural language” but in a grammar that is entirely artificial, often inconsistent and frustratingly unintuitive. It’s also incredibly verbose. Compare the code for the simple task of counting the number of items in /usr/bin directory. As ever, a shell script will always be the most concise:

ls -l /usr/bin | wc -l

Python is a little more verbose, but still fairly clean and familiar:

#!/usr/bin/python
import os
path, dirs, files = next(os.walk("/usr/bin"))
print len(files)

The AppleScript version, however, is something of an entirely different nature.

tell application "System Events"
	set theFiles to name of every file of folder "bin" of folder "usr" of startup disk
	count of theFiles
end tell

AppleScript is also slow in execution because, among other things, the underlying technology involves constructing and sending Apple Events through an archaic interface called the Apple Event Manager that was written for Apple’s System 7 operating system (released in 1991) and not optimized for performance even back then.


Source: AppleScript Overview,  © 2002, 2007 Apple Inc.

And it’s historically been difficult to develop scripts with AppleScript because most people who come to it will attempt to use the free, built-in but notoriously spartan (Apple)Script Editor.app, which lacks almost every and any feature developers normally expect and need. There’s no debugger, there’s no variable introspection, there’s no code snippets or effective code completion, to name just a few missing features.

Until recently, the only 3rd party alternative to Script Editor was priced at $200 and had a time-limited, 20-day demo period.

In short, the investment in time, effort and money required to produce something that still, after all that, can only be used on the macOS Desktop, effectively puts AppleScript at the bottom of the list for most people when it comes to choosing a useful or productive programming language. As a result, despite being with us for nearly 30 years, AppleScript is barely used by the majority of Mac admins, Mac developers or Mac end users. Indeed, AppleScript may have a good claim to being the Most Unloved and Unlovable Programming Language Ever.

So Why Do the Bad Guys Love Using AppleScript?

AppleScript was designed for automation and interapplication communication: the goal being to allow ordinary users to chain together repetitive tasks and execute them without further user interaction. For example, you can have Mail.app automatically trigger a script when it receives an email from a certain sender, or with a particular keyword in the subject line or content, extract whatever details you want from the email, and then populate a database in Excel or Numbers with the desired information, formatted and sorted on-the-fly as the data comes in. There’s no need for the user to be involved in any of this once the script is set up.

And as it turns out, automating interapplication communication and sidestepping user interaction is a godsend for malware authors. What could be more useful than bending popular applications like email clients, web browsers and the Microsoft Office suite to your will without needing to involve the user (aka in this scenario, the victim)?

And so, despite its general lack of appeal in almost all possible audiences for a scripting or programming language, there is one audience that does use AppleScript widely, if not particularly artfully or cleverly, and that is threat actors. Let’s look at some examples.

Recent Examples of AppleScript in macOS malware

A recent browser hijacker targeting Safari installs a hidden LaunchAgent that, via a shell script, loads, compiles and executes AppleScript.

It starts with a shell installer script packaged inside a DMG that’s supposed to contain an application called ‘PDFConverter4u’. But in a hidden .assets folder on the disk image is a first stage shell script:

5f198e82c0cf9a9f7d7a8d01273a6ad75a17a95960d8996dcdd028922b3d97bc

This unpacks and executes a second stage shell script:

55529224e9f70f5cab007e2ca98f6aec5cf31eb923fdfc09f60c01cc45c80666

Which eventually produces the hidden launch agent that executes another shell script containing the following AppleScript code, launched via osascript.

cdaa2121d79031cf39159198dfe64d3695a9c99ff7c3478a0b8953ade9052ecc

The purpose of the AppleScript is to replace the user’s search query on popular search engines google, bing and yahoo, with one provided by the attacker’s shell script. It’s a quick and easy way for bad actors to make money out of clicks which negatively impacts the victim’s productivity.

While this particular sample comes packed in a separate file, many others write their AppleScript directly into a MachO binary, either in plain text strings or in obfuscated base64 or similar encoding.

The following strings extracted from a Bundlore installer show that the code tries to force enable JavaScript execution in Google Chrome, then uses AppleScript to execute it in the active tab of the browser’s front window.

Strings from 41e0d31d52cb93f6a5020a278e8f360a6e134e6cc7092b4a5e575ac8b96a8d74

The next sample is a variant of a Pirrit malware.

21331ccee215801ca682f1764f3e37ff806e7510ded5576c0fb4d514b4cf2b7c

The authors use both plain text AppleScript and base64 encoded AppleScript, targeting Safari, Chrome and Firefox browsers.

Here’s some of the decoded base64 targeting Firefox and attempting to perform automated keystrokes to copy the current URL to the user’s clipboard before replacing the URL to that of the attacker’s choice:

Using AppleScript Without Apple Events

Speaking of base64, the next example illustrates something that many ordinary users and developers have overlooked about AppleScript, but which offensive actors have not: you can use AppleScript to execute any other kind of script, including python scripts like this one which drops the Empire exploit kit.

And what’s true of AppleScript and Python, is true of AppleScript and Perl, AppleScript and Bash and indeed AppleScript and absolutely any command line tool at all: you can call them all and bring their functionality into your AppleScript and combine that with other utilities.

The examples above all use what we might call ‘vanilla AppleScript’. That is, the native AppleScript language that’s been around since the early days of the platform. But starting in Yosemite, 10.10 and continuing up to and including the most recent version of macOS, AppleScript has been given increasing power through access to Cocoa frameworks, and this opens up the possibility of creating full-blown, powerful programs and applications with nothing other than AppleScript itself. Objective C executed through AppleScript is, speed-wise, more or less on a par with Objective C executed in a MachO binary.

And interestingly, although we haven’t seen threat actors making use of these powerful capabilities so far, there’s at least two reasons why we may well do so in the future: first to avoid detection, and second, because of the easy availability of a good development environment.

Using AppleScript to Avoid Detection

Avoiding detection on execution is a primary objective for all malware (even ransomware, which doesn’t want to get noticed until after execution). AppleScript offers offensive actors a plethora of ways to execute. In addition to simply executing a .scrpt file, you can run AppleScripts from Mail rules, from a shell script, in memory, from the command line, from within a MachO, in a plain text, uncompiled file, from an Automator workflow, from a Folder Action, a Finder Service or from a Calendar event.

Because of AppleScript’s ability to execute Objective C code without needing a compiled binary, this opens up a number of interesting attack possibilities. It also potentially opens up the ability to bypass detection tools based on Apple’s new kextless security framework introduced in macOS Catalina 10.15.

In an excellent post by Cedric Owens called Taking the macOS Endpoint Security Framework For A Quick Spin, Owens sets out to test what can and cannot be detected using three recently developed 3rd-party security tools that leverage the new Apple Endpoint Security framework.

One of the interesting things that Owens found was that if you tried capturing the user’s clipboard via osascript and vanilla AppleScript, this activity would be easily picked up by all the tools he was testing.

osascript -e 'the clipboard'

However, when using the native Cocoa API, NSPasteboard, none of the Endpoint Security framework-powered tools Owens tested appeared to capture that activity. But now, of course, we can execute NSPasteboard natively from AppleScript, too!

Notice that our one line, simple but also detectable osascript has turned into about 14 lines of complex-looking AppleScript-ObjC. Few people, certainly not I, would want to try and construct that kind of code in Script Editor.

However, the problem of developing complex AppleScripts is now more or less a thing of the past. The 3rd party alternative mentioned earlier in this post now has an unlimited free trial version and retails at half of its old price; more importantly, it also allows you to drag and drop a great deal of boilerplate code like that used in the script above straight into your scripts. And it provides developer-friendly functionality like code completion and API lookups that really take the pain out of developing AppleScript code.

Let’s look at another example. A lot of offensive operations want to avoid targets that are running particular software. Little Snitch is a prime example, various VM software is another. We can easily get a list of running apps by name and test for those, again directly by calling into Cocoa APIs, this time via NSWorkspace.

If we just want a true/false test for the existence of specific apps, we can just put the app names in a list and return true on the first hit.

In other words, by leveraging AppleScript’s hook into Cocoa frameworks, we can execute native code without the overhead of building MachO binaries or MachO apps (although you can do both of those with AppleScript, too!). We can do this filelessly so that we don’t get caught by new ‘kextless’ tools such as those tested by Owens, and we can execute this code in far more ways than any other kind of code available on macOS, whether that’s shell scripts, Python scripts or native macOS bundles.

Conclusion

The upshot here is that the main reasons why the good guys have typically eschewed AppleScript are in fact no longer relevant or true. Since we’ve already seen threat actors taking advantage of AppleScript despite those obstacles in the past, it’s only reasonable to assume that they may delve deeper into what this unique language has to offer in the future. Thanks to the native hook into Objective C and the powerful Cocoa frameworks, the variety of execution methods and now the availability of an excellent, free-to-use IDE, AppleScript has become a tool that is powerful, versatile and easy-to-develop with.

Attackers will always look to exploit the things defenders ignore, and to say that AppleScript has been ignored by the security community thus far is an understatement. I have elsewhere described AppleScript as “the PowerShell of macOS”. Certainly, it’s time we stopped thinking of AppleScript as the Most Unlovable Programming Language Ever and recognize that it may actually be the One macOS Programming Language to Rule Them All.


Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.

Read more about Cyber Security

To make locks touchless, Proxy bluetooth ID raises $42M

We need to go hands-off in the age of coronavirus. That means touching fewer doors, elevators, and sign-in iPads. But once a building is using phone-based identity for security, there’s opportunities to speed up access to WIFI networks and printers, or personalize conference rooms and video call set-ups. Keyless office entry startup Proxy wants to deliver all of this while keeping your phone in your pocket.

The door is just a starting point” Proxy co-founder and CEO Denis Mars tells me. “We’re . . . empowering a movement to take back control of our privacy, our sense of self, our humanity, our individuality.”

With the contagion concerns and security risks of people rubbing dirty, cloneable, stealable key cards against their office doors, investors see big potential in Proxy. Today it’s announcing here a $42 million Series B led by Scale Venture Partners with participation from former funders Kleiner Perkins and Y Combinator plus new additions Silicon Valley Bank and West Ventures.

The raise brings Proxy to $58.8 million in funding so it can staff up at offices across the world and speed up deployments of its door sensor hardware and access control software. “We’re spread thin” says Mars. “Part of this funding is to try to grow up as quickly as possible and not grow for growth sake. We’re making sure we’re secure, meeting all the privacy requirements.”

How does Proxy work? Employers get their staff to install an app that knows their identity within the company, including when and where they’re allowed entry. Buildings install Proxy’s signal readers, which can either integrate with existing access control software or the startup’s own management dashboard.

Employees can then open doors, elevators, turnstiles, and garages with a Bluetooth low-energy signal without having to even take their phone out. Bosses can also opt to require a facial scan or fingerprint or a wave of the phone near the sensor. Existing keycards and fobs still work with Proxy’s Pro readers. Proxy costs about $300 to $350 per reader, plus installation and a $30 per month per reader subscription to its management software.

Now the company is expanding access to devices once you’re already in the building thanks to its SDK and APIs. Wifi router-makers are starting to pre-provision their hardware to automatically connect the phones of employees or temporarily allow registered guests with Proxy installed — no need for passwords written on whiteboards. Its new Nano sensors can also be hooked up to printers and vending machines to verify access or charge expense accounts. And food delivery companies can add the Proxy SDK so couriers can be granted the momentary ability to open doors when they arrive with lunch.

Rather than just indiscriminately beaming your identity out into the world, Proxy uses tokenized credentials so only its sensors know who you are. Users have to approve of new networks’ ability to read their tokens, Proxy has SOC-2 security audit certification, and complies with GDPR. “We feel very strongly about where the biometrics are stored . . . they should stay on your phone” says Mars.

Yet despite integrating with the technology for two-factor entry unlocks, Mars says “We’re not big fans of facial recognition. You don’t want every random company having your face in their database. The face becomes the password you were supposed to change every 30 days.”

Keeping your data and identity safe as we see an explosion of Internet Of Things devices was actually the impetus for starting Proxy. Mars had sold his teleconferencing startup Bitplay to Jive Software where he met his eventually co-founder Simon Ratner, who’d joined after his video annotation startup  Omnisio was acquired by YouTube. Mars was frustrated about every IoT lightbulb and appliance wanting him to download an app, set up a profile, and give it his data.

The duo founded Proxy in 2016 as a universal identity signal. Today it has over 60 customers. While other apps want you to constantly open them, Proxy’s purpose is to work silently in the background and make people more productive. “We believe the most important technologies in the world don’t seek your attention. They work for you, they empower you, and they get out of the way so you can focus your attention on what matters most — living your life.”

Now Proxy could actually help save lives. “The nature of our product is contactless interactions in commercial buildings and workplaces so there’s a bit of an unintended benefit that helps prevent the spread of the virus” Mars explains. “We have seen an uptick in customers starting to set doors and other experiences in longer-range hands-free mode so that users can walk up to an automated door and not have to touch the handles or badge/reader every time.”

The big challenge facing Proxy is maintaining security and dependability since it’s a mission-critical business. A bug or outage could potentially lock employees out of their workplace (when they eventually return from quarantine). It will have to keep hackers out of employee files. Proxy needs to stay ahead of access control incumbents like ADT and HID as well as smaller direct competitors like $10 million-funded Nexkey and $28 million-funded Openpath.

Luckily, Proxy has found a powerful growth flywheel. First an office in a big building gets set up, then they convince the real estate manager to equip the lobby’s turnstiles and elevators with Proxy. Other tenants in the building start to use it, so they buy Proxy for their office. Then they get their offices in other cities on board…starting the flywheel again. That’s why Proxy is doubling down on sales to commercial real estate owners.

The question is when Proxy will start knocking on consumers’ doors. While leveling up into the enterprise access control software business might be tough for home smartlock companies like August, Proxy could go down market if it built more physical lock hardware. Perhaps we’ll start to get smart homes that know who’s home, and stop having to carry pointy metal sticks in our pockets.

HashiCorp soars above $5B valuation in new $175M venture round

The rise of the cloud over the past decade has forced software developers and DevOps engineers to completely rearchitect the modern web application, ensuring scalability, performance, and security. That’s a really painful proposition when done manually, which is where HashiCorp comes in to play. The company’s suite of products helps everyone in the tech workforce from IT admins to software developers operate in the cloud (mostly) effortlessly and natively.

The company’s products have long garnered rave reviews from technical staffs, and now the company is looking at a brand new massive valuation.

The SF-based startup announced today that it has raised $175 million in Series E financing from Franklin Templeton Investments at a scorching $5.1 billion valuation. For context, when we last covered the company back in late 2018, its valuation was only a “paltry” $1.9 billion following a $100 million round led by growth investor IVP.

The company in its release today touted its success in doubling revenues and customers every year for four straight years as the key reason behind the flush valuation. The company is making a (not so) subtle point that David McJannet, who joined the company as CEO in mid-2016 following a stint as an EIR at Greylock, has seen some success in his new role.

HashiCorp CEO David McJannet. Photo via HashiCorp

The company, founded by Mitchell Hashimoto and Armon Dadgar in 2012, is one of the major pioneers in helping companies build high-quality infrastructure that’s a mix of multi-cloud providers, private cloud, and even legacy systems.

It’s most well-known product is Terraform, which allows developers to write repeatable rules around enterprise infrastructure rather than a patchwork of different scripts that might not work as its writers intended. The idea is that with a consistent framework, HashiCorp’s product can help companies reduce costs (by protecting against, say, over-provisioning of resources) while also helping to balance scale and performance. The company’s other products include Consul around network automation, Vault for security, and Nomad for application deployment.

HashiCorp touches on a bunch of competitive products, but its cohesive set of tools and strong outreach to the developer community has set itself apart from the competition in recent years.

Franklin Templeton is a fairly late stage investor that has funded such enterprise companies as Cloudflare, which went public last year, logs management platform SumoLogic, and cybersecurity business Tanium, all according to Crunchbase.

With a hefty $5.1 billion valuation, the company narrowly missed the catastrophic decline of SaaS stocks over the past few weeks, which have been buffeted by the rapidly spreading global pandemic. But with a new war chest and a focus on a popular and growing enterprise market, the company seems poised to continue its growth.