Thursday, April 17, 2025
HomeCyber Security NewsNew XCSSET Malware Targets macOS Users Through Infected Xcode Projects

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Published on

SIEM as a Service

Follow Us on Google News

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022.

This sophisticated malware continues to target macOS users by infecting Xcode projects, a critical tool for Apple developers.

The latest variant introduces advanced obfuscation techniques, updated persistence mechanisms, and novel infection strategies, making it more challenging to detect and mitigate.

- Advertisement - Google News

The malware now employs significantly randomized encoding methods for generating payloads.

Unlike earlier versions that relied solely on the xxd (hexdump) tool, the new variant incorporates Base64 encoding with randomized iterations.

Additionally, the module names within its code are obfuscated, further complicating analysis and detection efforts.

To ensure persistence, the malware uses two distinct methods: the “zshrc” method and the “dock” method.

The “zshrc” method involves creating a file named ~/.zshrc_aliases containing the malicious payload and appending a command to the ~/.zshrc file to execute it during every new shell session.

The “dock” method is more intricate, involving the download of a signed dockutil tool from a command-and-control (C2) server.

This tool is used to replace the legitimate Launchpad application in the dock with a fake one that runs both the legitimate app and the malicious payload simultaneously.

New Infection Strategies

The updated XCSSET variant also introduces innovative methods for embedding its payload into Xcode projects.

It selects from multiple techniques—TARGET, RULE, or FORCED_STRATEGY—or places its payload in the TARGET_DEVICE_FAMILY key under build settings.

According to Microsoft, these approaches allow the malware to execute during later phases of project compilation, increasing its chances of infecting unsuspecting users.

This new variant builds on XCSSET’s previously known capabilities, which include stealing data from applications like notes, targeting digital wallets, exfiltrating system files, and even launching ransomware attacks.

Earlier versions exploited vulnerabilities in Safari and other browsers to steal cookies and inject malicious JavaScript into websites via universal cross-site scripting (UXSS) attacks.

These attacks allowed for credential theft, cryptocurrency address replacement, and unauthorized access to sensitive data.

To protect against this threat, users are advised to:

  • Inspect and verify any Xcode projects downloaded or cloned from repositories.
  • Only install applications from trusted sources like official app stores.
  • Use robust endpoint security solutions such as Microsoft Defender for Endpoint on Mac, which can detect this variant.

By adopting these precautions, developers and organizations can minimize their exposure to this evolving malware threat.

PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...