Saturday, April 26, 2025
Homecyber securityNew “ReaderUpdate” macOS Malware Evolves with Nim and Rust Variants

New “ReaderUpdate” macOS Malware Evolves with Nim and Rust Variants

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at SentinelOne have discovered that ReaderUpdate, a macOS malware loader platform that has been active since at least 2020, has significantly evolved with new variants written in multiple programming languages.

The malware, which previously went relatively unnoticed by many vendors, now includes versions written in Crystal, Nim, Rust, and most recently Go, in addition to the original compiled Python binary.

The Go variant, which has not been publicly reported until now, is a 4.5MB x86 binary that collects system hardware information to create a unique identifier for the victim.

- Advertisement - Google News

It then establishes persistence by copying itself to the ~/Library/Application Support/ directory and creating a companion .plist file in the LaunchAgents folder to execute on login.

Sophisticated Obfuscation Techniques

The Go variant employs several obfuscation methods to evade detection, including randomized function names and string obfuscation through character substitution algorithms.

The malware assembles characters on the stack or uses simple substitution routines to hide critical strings such as C2 URLs and property list content.

macOS Malware
The code receives the command from the C2 and executes it

SentinelOne researchers have identified nine samples of the Go variant connecting to seven unique domains, including airconditionersontop[.]com and streamingleaksnow[.]com.

These domains are part of a larger infrastructure that connects all ReaderUpdate variants.

Infection Chain and Potential Threats

ReaderUpdate infections typically begin with the malware being delivered through free or third-party software download sites, often via package installers containing fake utility apps.

Once installed, the malware reaches out to command and control servers and executes whatever remote commands the operators send.

While ReaderUpdate has primarily been associated with delivering Genieo (aka DOLITTLE) adware to date, security researchers warn that the loader has the capability to deliver more malicious payloads.

macOS Malware
ReaderUpdate persistence agent

Its design is consistent with a loader platform that might be offered to other threat actors as Pay-Per-Install (PPI) or Malware-as-a-Service (MaaS).

All versions of ReaderUpdate are compiled solely for x86 Intel architecture, meaning they require Rosetta 2 to execute on Apple silicon Macs.

The malware has been observed in various locations on infected systems, including ~/Library/Application Support/printers/printers and ~/Library/Application Support/etc/etc, with corresponding persistence agents in the LaunchAgents folder.

Security experts emphasize that despite its current focus on delivering adware, compromised hosts remain vulnerable to any payload the operators choose to deliver, highlighting the importance of maintaining strong defensive measures against this evolving threat.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

How to Develop a Strong Security Culture – Advice for CISOs and CSOs

Developing a strong security culture is one of the most critical responsibilities for today’s...

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...