A total of 21 new malware families designed to target macOS systems were discovered in 2023, according to Patrick Wardle, a researcher specializing in the security of Apple devices.
For each of the new malware families, Wardle’s blog describes the infection vector, persistence mechanism, features, and purpose. Malware samples have also been made available.
The list of macOS malware that emerged in 2023 includes ransomware, namely a Mac version of the LockBit file encryptor and a piece of ransomware named Turtle. While neither of them posed a serious threat to macOS users at the time of their discovery, their existence shows that cybercriminals continue to be interested in targeting Apple devices.
Information stealers were the most common type of new macOS malware. This type of malware is designed to help threat actors collect and exfiltrate sensitive data from compromised devices, including passwords, cookies and cryptocurrency wallets.
APT groups also developed Mac malware in 2023. Threat actors linked to North Korea have been the most active in this area, creating and using malware such as SmoothOperator, RustBucket, KandyKorn, ObjCShellz, as well as the FullHouse.Doored, StratoFear and TieDye malware used in the JumpCloud attack.
Other APT-developed malware identified in 2023 includes JokerSpy and NokNok (linked to Iran).
The list of macOS malware found last year also includes the SparkRAT backdoor, the Geacon backdoor, and the WSClient proxy.
In addition, the cybersecurity industry has spotted the iWebUpdater backdoor and updater (which has been around for five years), new variants of the CoinMiner and XLoader malware, and there have been reports of a potential macOS version of the Triangulation implant. Researchers have also seen ads for macOS malware named hVNC and ShadowVault, but they have yet to be seen in the wild.