LamePyre – macOS Malware That Takes Screenshots Repeatedly and Sends to Attacker

A new macOS malware disguised as a copy of Discord app takes screenshots
repeatedly and sends to attackers command-and-control (C&C) server.  The Legitimate Discord that used by gamers to communicate with each other. 

Malwarebytes researcher Adam Thomas found the malicious copy of the app, the malicious app pretends to be a legit Discord app, it includes Python code and base64-encoded Python snippets.

macOS MalwaremacOS Malware

To take the screenshot at regular intervals the payload will launch an agent which keeps the agent as well as the backdoor EmPyre code running.

The malware appears to be in the development stageand  it dosen’t include any functionality of the legitimate, the malicious app contains only an automated script.

The malware author uses the generic Automator icon that shows in the menu bar when any automated script is running. Before the user notice notices something is going wrong the malware sends screenshot to the attackers servers.

Another Mac malware was identified by Lambert and analyzed by Wardle, the malicious document which uses sandox escape to launch agent and a python script to maintain persistence.

The attack relies on the malicious Word document and the user need to allows macros to run, if macros disabled then you are safe.

DarthMiner and LamePyre had similarities in the way they are distributed, both use Python scripts and EmPyre backdoor. Researchers beleive both the malware created by the same developer.

Recently CoinTicker app suffered a supply chain attack, the app pushes 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in…

9 hours ago

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean IT…

9 hours ago

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics)…

9 hours ago

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security measures…

9 hours ago

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming approximately…

9 hours ago

Cloud Security Challenges Every CISO Must Address in Hybrid Environments

Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have become…

11 hours ago