Tuesday, February 25, 2025
HomeBackdoorXMRig - New Cryptojacking Malware Attack on Apple Mac Devices

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices

Published on

SIEM as a Service

Follow Us on Google News

New Mac Cyptominer Malware  XMRig affected Mac users that cause a sudden increase of the CPU process called mshelper and the fans are running out of control to mine Monero cryptocurrency.

A malicious process mshelper talking the complete CPU process and increase to a super high level and it also installs some of the suspicious processes as well.

This Cryptominer is extremely propagating in a various platform and the malware consumes the system resources and utilizes them for mining cryptocurrencies without user permissions.

The Cryptocurrency-stealing malware targets wallet address on local storage on various devices and replaces its own address.

Initially, malware dropper is being distributed through various medium such as email, social media and the malware installed by fake Adobe Flash Player installers, downloads from piracy sites, decoy documents users.

Later it tricks users to download and execute it and the researchers say the malware dropper is still unknown.

XMRig Cyptominer Infection Process on Mac Devices

Initially, a file name called pplauncher is installed in the specific location that mentioned below.

~/Library/Application Support/pplauncher/pplauncher

pplauncher is written in Golang language and compiled for Mac and the file is continuously running and the dropper needs root privilege.

It takes the complete responsibility for the process of installing and launching the miner process.

According to Malwarebytes, Using Golang introduces significant overhead, resulting in a binary file containing more than 23,000 functions. Using this for what appears to be simple functionality is probably a sign that the person who created it is not particularly familiar with Macs.

A Process called mshelper is a miner which is installing to the specific following folder

/tmp/mshelper/mshelper

This is an old version of XMRig miner, which can be installed on Macs via Homebrew which is Being used for the purpose of generating the cryptocurrency for the hacker behind the malware.

This malware is not particularly dangerous unless your Mac has a problem with damaged fans or dust-clogged vents that could cause overheating. Although the mshelper process is actually a legitimate piece of software being abused, it should still be removed along with the rest of the malware. Malwarebytes Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Global IoT Data Leak Exposes 2.7 Billion Records and Wi-Fi Passwords Worldwide

A massive security lapse has exposed over 2.7 billion records, including sensitive Wi-Fi credentials,...

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals.Among...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...