Sunday, April 20, 2025
HomeCyber Security NewsLazarus Hackers Exploits macOS Extended Attributes To Evade Detection

Lazarus Hackers Exploits macOS Extended Attributes To Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

The xattr command in Unix-like systems allows for the embedding of hidden metadata within files, similar to Windows ADS, known as Rustyattr, which is being exploited by threat actors like Lazarus Group to stealthily conceal malicious payloads within seemingly benign files.

The Lazarus Group is covertly embedding malicious data within system files using xattr, a technique that evades traditional detection methods and is currently not recognized by the MITRE ATT&CK Framework, leaving defenders vulnerable to these persistent attacks.

xattr provides a mechanism to store additional metadata, such as tags, flags, or binary data, alongside files on Unix-like systems, enabling flexible file management and organization beyond standard attributes.

- Advertisement - Google News

macOS xattr, while useful for system metadata, can be exploited by attackers to conceal malicious data within files, potentially bypassing security measures and hindering detection efforts.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

 creating a simple text file

A text file named `secret.txt` is created and filled with the content “not so secret.” Subsequently, the `xattr` command is employed to add a hidden attribute named `com.example.hidden_data` to the file, storing additional, concealed data within its extended attributes.

The `xattr secretfile.txt` command lists extended attributes associated with the specified file, while `xattr -p user.hidden_data secretfile.txt` reveals the hidden data stored within the ‘user.hidden_data’ attribute.

To view the hidden data stored in the extended attribute

The command `xattr -d com.example.hidden_data secret.txt` removes the extended attribute named “com.example.hidden_data” from the file “secret.txt,” which effectively eliminates the hidden data associated with the file.

The group has been exploiting macOS’s extended attributes (xattr) to conceal malicious code, evading detection by traditional security tools, which allows the group to maintain persistence on infected systems by hiding malicious payloads within file metadata. 

It’s RustyAttr trojan leverages macOS extended attributes for covert persistence, hiding malicious code from detection tools, which enables the group to maintain a stealthy presence on compromised systems, bypassing traditional security measures.

After extracting the zip file

By downloading a suspicious zip file (DD Form Questionnaire.zip), it contains a .docx and an .app file, while to investigate the .app file for hidden malicious code, it used the `xattr` command with the `-r` flag to recursively examine extended attributes within the application and any subdirectories.

Examining the app package with `xattr -r` revealed a custom attribute “test” containing a malicious script, which downloads a PDF, opens it, and fetches a second-stage payload from a remote server using AppleScript.  

The malicious domain, linked to a CERT-flagged IP address, confirms the involvement of the Lazarus Group, enabling further investigation into other malicious domains hosted on the same infrastructure. 

According to Denwp, the Lazarus Group leveraged the RustyAttr trojan to bypass macOS security measures, which, signed with a revoked certificate, exploits extended attributes to fetch and execute malicious scripts undetected, often disguised as legitimate applications, to deceive victims.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...