Sunday, April 13, 2025
HomeCyber Security NewsNew XCSSET Malware Targets macOS Users Through Infected Xcode Projects

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Published on

SIEM as a Service

Follow Us on Google News

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022.

This sophisticated malware continues to target macOS users by infecting Xcode projects, a critical tool for Apple developers.

The latest variant introduces advanced obfuscation techniques, updated persistence mechanisms, and novel infection strategies, making it more challenging to detect and mitigate.

- Advertisement - Google News

The malware now employs significantly randomized encoding methods for generating payloads.

Unlike earlier versions that relied solely on the xxd (hexdump) tool, the new variant incorporates Base64 encoding with randomized iterations.

Additionally, the module names within its code are obfuscated, further complicating analysis and detection efforts.

To ensure persistence, the malware uses two distinct methods: the “zshrc” method and the “dock” method.

The “zshrc” method involves creating a file named ~/.zshrc_aliases containing the malicious payload and appending a command to the ~/.zshrc file to execute it during every new shell session.

The “dock” method is more intricate, involving the download of a signed dockutil tool from a command-and-control (C2) server.

This tool is used to replace the legitimate Launchpad application in the dock with a fake one that runs both the legitimate app and the malicious payload simultaneously.

New Infection Strategies

The updated XCSSET variant also introduces innovative methods for embedding its payload into Xcode projects.

It selects from multiple techniques—TARGET, RULE, or FORCED_STRATEGY—or places its payload in the TARGET_DEVICE_FAMILY key under build settings.

According to Microsoft, these approaches allow the malware to execute during later phases of project compilation, increasing its chances of infecting unsuspecting users.

This new variant builds on XCSSET’s previously known capabilities, which include stealing data from applications like notes, targeting digital wallets, exfiltrating system files, and even launching ransomware attacks.

Earlier versions exploited vulnerabilities in Safari and other browsers to steal cookies and inject malicious JavaScript into websites via universal cross-site scripting (UXSS) attacks.

These attacks allowed for credential theft, cryptocurrency address replacement, and unauthorized access to sensitive data.

To protect against this threat, users are advised to:

  • Inspect and verify any Xcode projects downloaded or cloned from repositories.
  • Only install applications from trusted sources like official app stores.
  • Use robust endpoint security solutions such as Microsoft Defender for Endpoint on Mac, which can detect this variant.

By adopting these precautions, developers and organizations can minimize their exposure to this evolving malware threat.

PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...