Wednesday, April 9, 2025
HomeCyber Security NewsDridex Malware Targeting macOS Platform Using New Entry Method

Dridex Malware Targeting macOS Platform Using New Entry Method

Published on

SIEM as a Service

Follow Us on Google News

By using email attachments that resemble regular documents, a variant of Dridex (aka Bugat and Cridex), which is a banking malware is spreading to others through macOS.

Prior to now, the malware had been targeting Windows, but now it has been switched to attacking macOS instead, as reported by security researchers at Trend Micro.

Dridex Malware Targeting macOS

As one of the most common and dangerous information stealers, Dridex takes advantage of infected machines to access sensitive data, and not only that it also delivers and executes malicious programs. 

- Advertisement - Google News

A cybercrime group called Evil Corp (aka Indrik Spider) is suspected of being responsible for this attack chain and this malware. As well as being a successor to Gameover Zeus, the malware is a new threat.

As Trend Micro has identified, the Dridex malware sample consists of an executable Mach-O file, which can be run on both macOS and iOS platforms. There are several file extensions they use in their files, including the following:-

  • .o
  • .dylib
  • .bundle

A malicious document is contained in the Mach-O file, and once it is opened by the user, the malicious document runs automatically. Afterward, Microsoft Word files in the macOS user directory are overwritten, and more files are downloaded from a remote server.

In addition, it includes an executable file (.exe) that runs the malware, Dridex. These executables cannot be run on macOS as it is not compatible with the OS. 

It is possible, however, that Mac users could unwittingly infect others with malicious software when their Word files are overwritten by malicious versions when sharing their files over the Internet.

On the compromised machine, the binary attempts to download the Dridex loader which then attempts to execute the infection. A social engineering attack is typically used to deliver documents containing booby-trapped macros.

Recommendations

Dridex malware is not currently a threat to Mac users, so Mac users should be safe for now since the payload is an exe file. But, there is a possibility that this virus may be modified in the future to run on macOS by attackers, so users should stay alert.

  • Attachments that are not clearly attributed to their origin should not be opened.
  • Identify the sender by checking the sender’s email address and name.
  • Use an anti-malware program that is robust.
  • With macOS, Apple has included some security tools that are built into the operating system, including Gatekeeper as well as XProtect antivirus software.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed

Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super...

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Microsoft has urgently patched a high-risk security vulnerability (CVE-2025-29810) in Windows Active Directory Domain...

Adobe Security Update: Patches Released for Multiple Product Vulnerabilities

Adobe has announced critical security updates for several of its popular software products, addressing...

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

In a disturbing escalation of cyber threats, a new malware campaign dubbed 'HollowQuill' has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Microsoft has urgently patched a high-risk security vulnerability (CVE-2025-29810) in Windows Active Directory Domain...

Adobe Security Update: Patches Released for Multiple Product Vulnerabilities

Adobe has announced critical security updates for several of its popular software products, addressing...

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

In a disturbing escalation of cyber threats, a new malware campaign dubbed 'HollowQuill' has...