Friday, April 25, 2025
Homecyber securityPasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated new malware suite targeting macOS, dubbed “PasivRobber,” has been discovered by security researchers.

Identified on March 13, 2025, after a suspicious file named “wsus” was uploaded to VirusTotal, PasivRobber is a multi-component threat designed to steal a wide range of data from infected systems and popular applications.

The malware exhibits a deep understanding of macOS internals and employs several deceptive techniques.

- Advertisement - Google News

Its initial installer package is signed with a Developer ID belonging to “weihu chen,” but this package installs a secondary, unsigned package containing the core malware components.

The installation process attempts to hide the malware by using names similar to legitimate macOS processes, such as naming its main launcher “goed” instead of Apple’s “geod,” and using “wsus,” an acronym typically associated with Windows Server Update Services. It also disguises dynamic libraries (dylibs) by giving them “.gz” extensions.

Targeting and Potential Origin

Evidence strongly suggests PasivRobber originates from and targets Chinese users. The malware specifically extracts data from applications popular in China, including WeChat and QQ.

Developer paths found within the code contain the name “Meiya,” and initial open-source intelligence links the developer signature to “Xiamen Huanya Zhongzhi Technology Partnership Enterprise,” a company connected to “Xiamen Meiya Pico Information Co., Ltd.”

Meiya Pico is known for developing forensic and security products and has previously been linked by the U.S. Treasury to the Chinese Military-Industrial Complex and the development of surveillance software.

While a definitive link is not confirmed, the capabilities and sophistication align with Meiya Pico’s profile.

Capabilities and Structure

According to the Report, PasivRobber uses a complex, multi-layered structure, leading researchers to name it after the PASIV device and multi-level dream espionage in the film Inception, combined with its use of “Robber.dylib” components.

The suite operates through several key binaries:

  • goed: Launched via a persistent LaunchDaemon, this binary starts the main operations by executing wsus.
  • wsus: Handles remote actions, including updates via FTP, uninstallation via RPC messages, and capturing screenshots using the Core Graphics framework. It also attempts to extract keys and data from Instant Messaging application caches and plists.
  • center: Acts as an on-device agent, collecting system information (hardware model, OS details, memory stats) and logging activity. Crucially, it uses another bundled binary, “apse” (similar to the open-source insert_dylib tool), to inject malicious code into running applications like WeChat, QQ, and WeCom (WeChat Enterprise). It can kill these apps, inject code (potentially using Frida framework scripts embedded in libIMKeyTool.dylib), and then re-sign them.
  • Plugins: The suite includes 28 plugins disguised as .gz files located in /Library/protect/wsus/bin_arm/plugins/. These target specific data sources, including system files, browser data (Safari, Chrome, Firefox), email clients (Mail, Outlook, Foxmail), chat applications, and cloud storage configurations. Collected data appears to be stored in a local SQLite database.

The malware checks System Integrity Protection (SIP) status before attempting certain actions like key extraction from IM apps using libIMKeyTool.dylib, suggesting these functions only work if SIP is disabled.

It also includes functionality for remote uninstallation and uses TEA encryption for its logs and configuration files.

Researchers also found evidence of related Windows components within the macOS package, indicating a potential cross-platform aspect to the threat.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...

SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment

Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...