Sunday, November 24, 2024
HomeAppleLamePyre - macOS Malware That Takes Screenshots Repeatedly and Sends to Attacker

LamePyre – macOS Malware That Takes Screenshots Repeatedly and Sends to Attacker

Published on

A new macOS malware disguised as a copy of Discord app takes screenshots
repeatedly and sends to attackers command-and-control (C&C) server.  The Legitimate Discord that used by gamers to communicate with each other. 

Malwarebytes researcher Adam Thomas found the malicious copy of the app, the malicious app pretends to be a legit Discord app, it includes Python code and base64-encoded Python snippets.

macOS Malware

To take the screenshot at regular intervals the payload will launch an agent which keeps the agent as well as the backdoor EmPyre code running.

- Advertisement - SIEM as a Service

The malware appears to be in the development stageand  it dosen’t include any functionality of the legitimate, the malicious app contains only an automated script.

The malware author uses the generic Automator icon that shows in the menu bar when any automated script is running. Before the user notice notices something is going wrong the malware sends screenshot to the attackers servers.

Another Mac malware was identified by Lambert and analyzed by Wardle, the malicious document which uses sandox escape to launch agent and a python script to maintain persistence.

The attack relies on the malicious Word document and the user need to allows macros to run, if macros disabled then you are safe.

DarthMiner and LamePyre had similarities in the way they are distributed, both use Python scripts and EmPyre backdoor. Researchers beleive both the malware created by the same developer.

Recently CoinTicker app suffered a supply chain attack, the app pushes 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...