Friday, May 23, 2025
HomeMalwareDangerous macOS Backdoor That Steals User Login Credentials Remained Undetected for Years

Dangerous macOS Backdoor That Steals User Login Credentials Remained Undetected for Years

Published on

SIEM as a Service

Follow Us on Google News

A macOS backdoor dubbed Calisto remained undetected from the radar of antivirus solutions for years. The malware initially uploaded into virustotal back in 2016 and remains undetected until May 2018.

Security researchers from Kaspersky spotted the macOS malware sample with suspiciously familiar features that include remote login, screen sharing, remote login and hidden root account.

Calisto Distribution & Installation

Calisto installation file is an unsigned DMG image that poses as a Leading Mac security and antivirus software Intego’s security solution for Mac.

Threat actors made the macOS malware appearing more convincing and only the user who already installed the app can spot the difference.

- Advertisement - Google News
Calisto

As like any other application it starts the installation with the license agreement and in the next step it asks for the username and password. Once the user inputs the credentials it shows installation failed and asks users a new installation package from the official site.

Calisto’s activity on a computer with SIP-enabled is limited and it failed to modify system files. In the infected machine, it creates a hidden folder.Callisto to store Keychain data, login credentials, network connection details and Google Chrome data.

With SIP disabled machine it performs many other operations that include

Copying itself to /System/Library/ folder
Sets itself to launch automatically on startup
Unmounts and uninstalls its DMG image
Adds itself to Accessibility
Harvests additional information about the system
Enables remote access to the system
Forwards the harvested data to a C&C server

According to researchers, the Calisto backdoor appears to be similar like Backdoor.OSX.Proton which steals user personal data and contents of Keychain.

To defends against Calisto and their analogues, never disable SIP, Updates OS to current version, Run application only from the trusted source and use a reputed Antivirus.

Also Read

MACOS Malware Targeting Cryptocurrency Users On Slack and Discord – 100% Undetected Virustotal

macOS Signature Validation Flaw Allows a Malicious Code Appeared to be Signed by Apple

New MacOS Backdoor Distributed through Malicious Word Documents

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself...

GenAI Assistant DIANNA Uncovers New Obfuscated Malware

Deep Instinct’s GenAI-powered assistant, DIANNA, has identified a sophisticated new malware strain dubbed BypassERWDirectSyscallShellcodeLoader. This...

Hackers Expose 184 Million User Passwords via Open Directory

A major cybersecurity incident has come to light after researcher Jeremiah Fowler discovered a...

New Formjacking Malware Targets E-Commerce Sites to Steal Credit Card Data

A disturbing new formjacking malware has emerged, specifically targeting WooCommerce-based e-commerce sites to steal...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

GenAI Assistant DIANNA Uncovers New Obfuscated Malware

Deep Instinct’s GenAI-powered assistant, DIANNA, has identified a sophisticated new malware strain dubbed BypassERWDirectSyscallShellcodeLoader. This...

New Formjacking Malware Targets E-Commerce Sites to Steal Credit Card Data

A disturbing new formjacking malware has emerged, specifically targeting WooCommerce-based e-commerce sites to steal...

Researchers Uncover Infrastructure and TTPs Behind ALCATRAZ Malware

Elastic Security Labs has recently exposed a sophisticated new malware family dubbed DOUBLELOADER, observed...