Friday, March 7, 2025
HomeChromemacOS Malware Added New Weapons to Its Arsenal To Attack Google Chrome...

macOS Malware Added New Weapons to Its Arsenal To Attack Google Chrome & Telegram

Published on

SIEM as a Service

Follow Us on Google News

The security researchers of Trend Micro have recently detected that the XCSSET malware that has been outlined to attack the macOS operating system got updated. 

The analysts noted that the new updated version consists of a new feature, that enables the stealing of private data from different applications, which also includes the Google Chrome browser and the Telegram messenger.

However, this malware has been implementing different attacks since August 2020, and according to the analysts, this malware has various skills, like:-

  • Understanding and resetting the Safari cookies
  • Inserting malicious JavaScript on different websites
  • Stealing data from applications
  • Encrypts user files

How XCSSET Malware Steals Information?

Now the big question arises here that how this malware steals the data? Since it has been implementing various operations since August 2020, the security researchers detected that its first version initially accumulates data from different apps and transfers them back to back its command-and-control (C&C) server. 

However, the cybersecurity experts were not aware of how the threat actors use the stolen data.

The new updated version has targeted Telegram, and here the main motive of the malware is to decreasing the folder ~/Library/GroupContainers/6N38VWS5BX.ru.keepcoder.Telegram” into a. ZIP file, and then later they upload the supposed file to a C&C server. 

Apart from Telegram, this new version of XCSSET malware has also targeted the Chrome browser of Google.

The experts have also found some steps that will help to find the main motive for collecting folder, and that’s why we have mentioned them below:-

  • At first install Telegram on both machines A and B./li>
  • Next to machine A, enter with a compelling Telegram account. And don’t do anything in the Telegram by using the machine B./li>
  • Next copy the “~/Library/Group Containers/6N38VWS5BX.ru.keepcoder.Telegram” folder from machine A to machine B, and substitute the existing folder.
  • Lastly, run a Telegram on machine B. When all this is done you can see that you have already logged in with the same account that has been used on machine A.

Sensitive data targeted by XCSSET

XCSSET malware has been conducting such operations for a long time, and till now it has stolen loads of critical privacy data of various applications. 

However, this new version has also attacked Google Chrome, in that the data that has been stolen includes any passwords collected by the user to discard the data.

Apart from this, in this process the XCSSET malware requires to get the safe_storage_key using the command security find- generic-password -was ‘Chrome’. According to the report, once the Chrome safe_storage_key, is obtained, it simply decrypts all the delicate data and uploads it to the C&C server managed by the threat actors.

Apps Targeted

Below we have mentioned the apps that are targeted and abused:-

  • Apple’s own Contacts
  • Evernote
  • Notes
  • Opera
  • Skype
  • WeChat

New C&C Domains

Here is the list of new C&C domains used by the threat actors:-

  • atecasec[.]info
  • datasomatic[.]ru
  • icloudserv[.]ru
  • lucidapps[.]info
  • relativedata[.]ru
  • revokecert[.]ru
  • safariperks[.]ru

Mitigation

Moreover, this new version of XCSSET malware does not bring any fundamental change, but it has come up with some new techniques and features. However, one can protect themselves from such malware, by downloading different apps from legitimate sites.

Moreover, users can also use multilayered security solutions, as using such security solutions will implement complete security protection against this kind of cyberthreats.

Apart from Chrome and Telegram, XCSSET malware has also targetted and plunder sensitive information from various popular apps as well.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play

HUMAN's Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed "BADBOX...

Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware

Recent research by Veriti has uncovered a disturbing trend in cybersecurity: malicious actors are...

PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards

A large-scale cybercrime operation dubbed "PrintSteal" has been exposed, revealing a complex network involved...