Malware & Threats

21 New Mac Malware Families Emerged in 2023

A total of 21 new malware families targeting macOS systems were discovered in 2023, a 50% increase compared to 2022. 

A total of 21 new malware families targeting macOS systems were discovered in 2023, a 50% increase compared to 2022. 

A total of 21 new malware families designed to target macOS systems were discovered in 2023, according to Patrick Wardle, a researcher specializing in the security of Apple devices.

Wardle has published a blog post analyzing the new malware families that emerged last year and the total number represents an increase of over 50% compared to 2022

For each of the new malware families, Wardle’s blog describes the infection vector, persistence mechanism, features, and purpose. Malware samples have also been made available. 

The list of macOS malware that emerged in 2023 includes ransomware, namely a Mac version of the LockBit file encryptor and a piece of ransomware named Turtle. While neither of them posed a serious threat to macOS users at the time of their discovery, their existence shows that cybercriminals continue to be interested in targeting Apple devices.

Information stealers were the most common type of new macOS malware. This type of malware is designed to help threat actors collect and exfiltrate sensitive data from compromised devices, including passwords, cookies and cryptocurrency wallets. 

The list of infostealers spotted in 2023 includes PureLand, Realst, MetaStealer, AtomicStealer (AMOS), JaskaGO, MacStealer, and GoSorry.

APT groups also developed Mac malware in 2023. Threat actors linked to North Korea have been the most active in this area, creating and using malware such as SmoothOperator, RustBucket, KandyKorn, ObjCShellz, as well as the FullHouse.Doored, StratoFear and TieDye malware used in the JumpCloud attack

Other APT-developed malware identified in 2023 includes JokerSpy and NokNok (linked to Iran).

Advertisement. Scroll to continue reading.

The list of macOS malware found last year also includes the SparkRAT backdoor, the Geacon backdoor, and the WSClient proxy.

In addition, the cybersecurity industry has spotted the iWebUpdater backdoor and updater (which has been around for five years), new variants of the CoinMiner and XLoader malware, and there have been reports of a potential macOS version of the Triangulation implant. Researchers have also seen ads for macOS malware named hVNC and ShadowVault, but they have yet to be seen in the wild.

Related: Many of 13 New Mac Malware Families Discovered in 2022 Linked to China 

Related: Stealthy Mac Malware Delivered via Pirated Apps

Related: Repurposing Mac Malware Not Difficult, Researcher Shows

Related Content

Malware & Threats

A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.

Malware & Threats

A North Korea-linked threat actor hijacked the update mechanism of eScan antivirus to deploy backdoors and cryptocurrency miners.

Malware & Threats

A threat actor tracked as CoralRaider has been using multiple infostealers to harvest credentials from users worldwide.

Malware & Threats

Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations.

Malware & Threats

Checkmarx warns of a new attack relying on GitHub search manipulation to deliver malicious code.

Malware & Threats

Human Security identifies 28 VPN applications for Android and an SDK that turn devices into proxies.

Malware & Threats

A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon.

Malware & Threats

More than 100 organizations in the US and EU have been targeted in recent StrelaStealer infostealer campaigns.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version