Categories: Security News

New MacOS Backdoor Distributed through Malicious Word Documents

A new MacOS Backdoor that embedded in malicious Word document has been likely distributed through phishing campaigns. Upon executing the documents it asks users to enable macros to download the final payload.

TrendMicro Researchers believe the backdoor is linked to hacking group OceanLotus, who responsible for launching high profile attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.

Attackers targeted MacOS computers that have Perl modules installed. The MacOS Backdoor OSX_OCEANLOTUS.D is written in Perl programming language and the macro is obfuscated using decimal ASCII code.

MacOS BackdoorMacOS Backdoor

The dropper is a persistent one and all the strings in the dropper are encrypted using an RSA256 key and custom base64-encoded.

MacOS Backdoor Functions

The backdoor contains two important functions.

infoClient – It collects the information and such as ComputerName, Mac OSX version, Owner’s name and checks for x86/ 64 bit.

runHandle – responsible for handling backdoor operations

All the data collected will be encrypted and then transferred to the C&C server. It scrambles it checks for the byte is odd or even and adds data according to it.

The scrambled data is to be encrypted again with randomly AES 256 key and the key is also scrambled with operation XOR 0x13 followed by ROL 6 operation.

Also, the final payload that obtained from the server also decoded again in a similar manner via decryption and scrambling.

How to stay safe – Business Phishing Campaign

1. Have a unique Email address.
2. Do not open any attachments without proper validation.
3. Don’t open emails voluntary emails.
4. Use Spam filters & Antispam gateways.
5. Never respond to any spam emails.
6. verify the vendor.
7. Implement Two-factor Authentication

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…

6 hours ago

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…

6 hours ago

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

7 hours ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

7 hours ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

8 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

8 hours ago