Tuesday, February 11, 2025
HomeBackdoorXMRig - New Cryptojacking Malware Attack on Apple Mac Devices

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices

Published on

SIEM as a Service

Follow Us on Google News

New Mac Cyptominer Malware  XMRig affected Mac users that cause a sudden increase of the CPU process called mshelper and the fans are running out of control to mine Monero cryptocurrency.

A malicious process mshelper talking the complete CPU process and increase to a super high level and it also installs some of the suspicious processes as well.

This Cryptominer is extremely propagating in a various platform and the malware consumes the system resources and utilizes them for mining cryptocurrencies without user permissions.

The Cryptocurrency-stealing malware targets wallet address on local storage on various devices and replaces its own address.

Initially, malware dropper is being distributed through various medium such as email, social media and the malware installed by fake Adobe Flash Player installers, downloads from piracy sites, decoy documents users.

Later it tricks users to download and execute it and the researchers say the malware dropper is still unknown.

XMRig Cyptominer Infection Process on Mac Devices

Initially, a file name called pplauncher is installed in the specific location that mentioned below.

~/Library/Application Support/pplauncher/pplauncher

pplauncher is written in Golang language and compiled for Mac and the file is continuously running and the dropper needs root privilege.

It takes the complete responsibility for the process of installing and launching the miner process.

According to Malwarebytes, Using Golang introduces significant overhead, resulting in a binary file containing more than 23,000 functions. Using this for what appears to be simple functionality is probably a sign that the person who created it is not particularly familiar with Macs.

A Process called mshelper is a miner which is installing to the specific following folder

/tmp/mshelper/mshelper

This is an old version of XMRig miner, which can be installed on Macs via Homebrew which is Being used for the purpose of generating the cryptocurrency for the hacker behind the malware.

This malware is not particularly dangerous unless your Mac has a problem with damaged fans or dust-clogged vents that could cause overheating. Although the mshelper process is actually a legitimate piece of software being abused, it should still be removed along with the rest of the malware. Malwarebytes Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has...

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...