Updated macOS malware variant uncovered by Microsoft

Date:

Share:



Microsoft has observed a previously dormant macOS malware that has become active once again in a new variant that is targeting Apple devices of all kinds.

Microsoft Threat Intelligence shared information about the malware in a post on X, indicating that it is a new version of XCSSET that originated in 2022. The security experts explained that the updated malware has “enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies.”

Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a sophisticated modular macOS malware that targets users by infecting Xcode projects, in the wild. While we’re only seeing this new XCSSET variant in limited attacks at this time, we’re sharing this information… pic.twitter.com/oWfsIKxBzB

— Microsoft Threat Intelligence (@MsftSecIntel) February 17, 2025

TechRadar noted that the XCSSET malware is essentially an infostealer, with the ability to attack digital wallets, gather data from the Apple Notes app, and collect system information and files.

The malware is particularly dangerous because it uses infected projects in Apple’s Xcode platform to infiltrate devices. Xcode is the official integrated development environment (IDE) Apple provides for app creation for its various operating systems, including macOS, iOS, iPadOS, watchOS, and tvOS. The environment includes a code editor, debugger, Interface Builder, and tools for testing and deploying apps, the publication added.

As said, the updated XCSSET variant includes processes, allowing the malware to better obscure itself within Xcode. To do so, it uses two techniques, called “zshrc” and “dock”. The first attack allows the malware to create a file, ~/.zshrc_aliases, which holds the infected data. Then it adds a command in the ~/.zshrc file, which will prompt the infected file to launch every time a new shell session is initiated. This will ensure the malware will continue to spread with additional shell sessions.

With the second attack, the malware downloads “a signed dockutil tool from a command-and-control server to manage the dock items, ” Microsoft explained. After this, it creates a fake Launchpad app to replace the path entry for the actual Launchpad app on the device dock. When a user runs Launchpad on an infected device, the actual Launchpad app and the malware version will both execute, effectively spreading XCSSET.

Microsoft Threat Intelligence explained it has only seen the new malware variant “in limited attacks,” it is sharing information about the threat so users and organizations can take precautionary measures.








Source link

━ more like this

Offshore sector warns Europe’s net zero and energy security targets at risk – London Business News | Londonlovesbusiness.com

Europe’s ambition to install 300-400 GW of offshore wind by 2050 cannot be realised without scaling up the marine contracting sector — the...

Interest rates could be held as inflation increased in April – London Business News | Londonlovesbusiness.com

On Thursday the Bank of England’s Monetary Policy Committee (MPC) might vote to keep interest rates at 4.25%, economists are predicting. This comes as...

Chancellor warns conflict in the Middle East has increased oil and gas prices – London Business News | Londonlovesbusiness.com

The Chancellor has warned conflict in the Middle East between Israel and Iran has pushed up oil and gas prices by 10%. Rachel Reeves...

The UK will pay with ‘the blood of our citizens’ if the government doesn’t ‘wake up’ – London Business News | Londonlovesbusiness.com

The former Defence Secretary Penny Mordaunt has warned that if the government does not spend money to boost the UK’s defence then it...

How to set up a WhatsApp account without Facebook or Instagram

There's no shortage of reasons to stay off the Meta ecosystem, which includes Facebook and Instagram, but there are some places where WhatsApp...
spot_img