Hackers Find New Ways to Use .EXE File Against macOS to Launch Malware that Bypass Protection & Steal Data

Yes, What you hear is something mysterious that the .EXE file runs on macOS is totally new right. but this strange activity uncovered by security researchers that, an EXE files in the wild delivering a malicious payload on Mac.

It is not only launching the malware but the .exe file is capable of bypass the mac security mechanism such as Gatekeeper.

Basically, EXE files format is an official and dedicated windows file format that wont be able to run on Linux, macOS, but if it tries to run on it then both OS will throw the error message.

In this case, new .EXE file routine evades the Gatekeeper protection on Mac because it checks only native Mac files but it will not checking the EXE and bypasses the signature detection and verification.

This is new malware attack mostly learn from the countries such as
United Kingdom, Australia, Armenia, Luxembourg, South Africa and the United States.

Infection & Bhaviour on Mac

Researchers found “Little Snitch” An installer of popular firewall app
that can be downloaded from various torrent websites for Mac and windows .

Once extracted the Zip File. Some of the Zipped .NET compiled Windows executable sample which contains a .DMG file hosting the installer for Little Snitch.

Later analysing the installer contents, researchers found the very unusual
.EXE file inside of the MonoBundle that is eventually responsible for the malicious payload.

Mono Bundle turn your Mono application into a Mac bundle, and you can also get a Mac installer for your application.

According to Trend Micro, “When the installer is executed, the main file also launched the executable as it is enabled by the mono framework included in the bundle. This framework allows the execution of Microsoft .NET applications across platforms such as OSX. “

Once the .DMG files are ready then it popup the adware that posed as a legitimate flash player installer and also PUAs displayed when the file is run.

This specific malicious .EXE file was tired attempt to execute in the windows machine but it displays the error.

“The bundling of the files with the said framework becomes a workaround to bypass the systems given EXE is not a recognized binary executable by MacOS’ security features. As for the native library differences between Windows and MacOS, mono framework supports DLL mapping to support Windows-only dependencies to their MacOS counterparts.” Trend Micro Researchers said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

Apple Released Security Update & Fixes for iOS FaceTime Zero-day Vulnerability

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices


Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured on-premises…

18 hours ago

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions…

1 day ago

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing…

2 days ago

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI…

2 days ago

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables…

2 days ago

Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025

Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address…

2 days ago