Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022.
This sophisticated malware continues to target macOS users by infecting Xcode projects, a critical tool for Apple developers.
The latest variant introduces advanced obfuscation techniques, updated persistence mechanisms, and novel infection strategies, making it more challenging to detect and mitigate.
The malware now employs significantly randomized encoding methods for generating payloads.
Unlike earlier versions that relied solely on the xxd
(hexdump) tool, the new variant incorporates Base64 encoding with randomized iterations.
Additionally, the module names within its code are obfuscated, further complicating analysis and detection efforts.
To ensure persistence, the malware uses two distinct methods: the “zshrc” method and the “dock” method.
The “zshrc” method involves creating a file named ~/.zshrc_aliases
containing the malicious payload and appending a command to the ~/.zshrc
file to execute it during every new shell session.
The “dock” method is more intricate, involving the download of a signed dockutil
tool from a command-and-control (C2) server.
This tool is used to replace the legitimate Launchpad application in the dock with a fake one that runs both the legitimate app and the malicious payload simultaneously.
The updated XCSSET variant also introduces innovative methods for embedding its payload into Xcode projects.
It selects from multiple techniques—TARGET, RULE, or FORCED_STRATEGY—or places its payload in the TARGET_DEVICE_FAMILY
key under build settings.
According to Microsoft, these approaches allow the malware to execute during later phases of project compilation, increasing its chances of infecting unsuspecting users.
This new variant builds on XCSSET’s previously known capabilities, which include stealing data from applications like notes, targeting digital wallets, exfiltrating system files, and even launching ransomware attacks.
Earlier versions exploited vulnerabilities in Safari and other browsers to steal cookies and inject malicious JavaScript into websites via universal cross-site scripting (UXSS) attacks.
These attacks allowed for credential theft, cryptocurrency address replacement, and unauthorized access to sensitive data.
To protect against this threat, users are advised to:
By adopting these precautions, developers and organizations can minimize their exposure to this evolving malware threat.
PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar
Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for…
A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands accused…
A severe vulnerability has been identified in the Apache Parquet Java library, specifically within its parquet-avro module.…
A critical security flaw has been discovered in Halo ITSM, an IT support management software widely…
Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading to…
In a significant update to the popular dynamic instrumentation toolkit Frida, developers have introduced powerful…