Monday, April 21, 2025
Homecyber securityPasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated new malware suite targeting macOS, dubbed “PasivRobber,” has been discovered by security researchers.

Identified on March 13, 2025, after a suspicious file named “wsus” was uploaded to VirusTotal, PasivRobber is a multi-component threat designed to steal a wide range of data from infected systems and popular applications.

The malware exhibits a deep understanding of macOS internals and employs several deceptive techniques.

- Advertisement - Google News

Its initial installer package is signed with a Developer ID belonging to “weihu chen,” but this package installs a secondary, unsigned package containing the core malware components.

The installation process attempts to hide the malware by using names similar to legitimate macOS processes, such as naming its main launcher “goed” instead of Apple’s “geod,” and using “wsus,” an acronym typically associated with Windows Server Update Services. It also disguises dynamic libraries (dylibs) by giving them “.gz” extensions.

Targeting and Potential Origin

Evidence strongly suggests PasivRobber originates from and targets Chinese users. The malware specifically extracts data from applications popular in China, including WeChat and QQ.

Developer paths found within the code contain the name “Meiya,” and initial open-source intelligence links the developer signature to “Xiamen Huanya Zhongzhi Technology Partnership Enterprise,” a company connected to “Xiamen Meiya Pico Information Co., Ltd.”

Meiya Pico is known for developing forensic and security products and has previously been linked by the U.S. Treasury to the Chinese Military-Industrial Complex and the development of surveillance software.

While a definitive link is not confirmed, the capabilities and sophistication align with Meiya Pico’s profile.

Capabilities and Structure

According to the Report, PasivRobber uses a complex, multi-layered structure, leading researchers to name it after the PASIV device and multi-level dream espionage in the film Inception, combined with its use of “Robber.dylib” components.

The suite operates through several key binaries:

  • goed: Launched via a persistent LaunchDaemon, this binary starts the main operations by executing wsus.
  • wsus: Handles remote actions, including updates via FTP, uninstallation via RPC messages, and capturing screenshots using the Core Graphics framework. It also attempts to extract keys and data from Instant Messaging application caches and plists.
  • center: Acts as an on-device agent, collecting system information (hardware model, OS details, memory stats) and logging activity. Crucially, it uses another bundled binary, “apse” (similar to the open-source insert_dylib tool), to inject malicious code into running applications like WeChat, QQ, and WeCom (WeChat Enterprise). It can kill these apps, inject code (potentially using Frida framework scripts embedded in libIMKeyTool.dylib), and then re-sign them.
  • Plugins: The suite includes 28 plugins disguised as .gz files located in /Library/protect/wsus/bin_arm/plugins/. These target specific data sources, including system files, browser data (Safari, Chrome, Firefox), email clients (Mail, Outlook, Foxmail), chat applications, and cloud storage configurations. Collected data appears to be stored in a local SQLite database.

The malware checks System Integrity Protection (SIP) status before attempting certain actions like key extraction from IM apps using libIMKeyTool.dylib, suggesting these functions only work if SIP is disabled.

It also includes functionality for remote uninstallation and uses TEA encryption for its logs and configuration files.

Researchers also found evidence of related Windows components within the macOS package, indicating a potential cross-platform aspect to the threat.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...