Updated male malware variant discovered by Microsoft

Microsoft has observed a previously inactive macos malware that has become active once again in a new variant that is directed to Apple devices of all kinds.

Microsoft’s intelligence shared information about malware in an X post, indicating that it is a new XCSset version that originated in 2022. Security experts explained that updated malware has “improved obfuscation methods, mechanisms, mechanisms of updated persistence and new infection strategies.

Microsoft Menazing Intelligence has discovered a new XCSset variant, a sophisticated modular macOS malware that addresses users by infecting Xcode projects, in nature. While we are only seeing this new XCSset variant in limited attacks at this time, we are sharing this information … pic.twitter.com/owfsikxbzb

– Microsoft Menazing Intelligence (@MSFTSECINTEL) February 17, 2025

Techradar He pointed out that XCSset malware is essentially an Infoptealer, with the ability to attack digital wallets, collect data from the Apple Notes application and collect information and system files.

Malware is particularly dangerous because it uses infected projects on Apple’s Xcode platform to infiltrate devices. XCODE is the Official Integrated Development Environment (IDE) Apple provides the creation of applications for its various operating systems, including macos, iOS, ipados, watchos and tvos. The environment includes an editor of codes, treatment plant, interfaces and tools to test and implement applications, added the publication.

As stated, the updated XCSset variant includes processes, which allows malware to darken better within XCODE. To do so, use two techniques, called “ZSHRC” and “Dock”. The first attack allows malware to create a file, ~/.Zshrc_aliasses, which contains infected data. Then add a command in the ~/.Zshrc file, which will ask the infected file to start every time a new Shell session starts. This will ensure that malware continues to spread with additional Shell sessions.

With the second attack, the malware downloads “a dockutil tool signed from a command and control server to manage the dock elements,” Microsoft explained. After this, create a fake launchpad application to replace the route entry for the launch application of the royal route on the device dock. When a user executes launchpad on an infected device, the real launchpad application and the malware version will be executed, effectively spreading XCSset.

Microsoft Threat Intelligence explained that he has only seen the new malware variant “in limited attacks”, he is sharing information about the threat so that users and organizations can take precautionary measures.






#Updated #male #malware #variant #discovered #Microsoft

Leave a Reply

Your email address will not be published. Required fields are marked *