Security Experts:

Connect with us

Hi, what are you looking for?



Chinese Cyberspies Seen Using macOS Variant of ‘Gimmick’ Malware

In late 2021, incident response and threat intelligence firm Volexity observed a Chinese threat actor using a macOS variant of the malware known as Gimmick.

In late 2021, incident response and threat intelligence firm Volexity observed a Chinese threat actor using a macOS variant of the malware known as Gimmick.

Tracked as Storm Cloud, the Chinese APT is known for engaging in targeted cyberespionage activities against organizations in Asia. In its attacks, the group relies on built-in utilities, custom malware, and open source tools.

Gimmick is a multi-platform malware family that relies on public cloud services for command and control (C&C), and which provides attackers with a broad range of capabilities.

The macOS variant – identified on a MacBook Pro running macOS 11.6 (Big Sur) – is primarily written in Objective C, while previously observed Windows versions were built in .NET and Delphi. All variants, however, share the same C&C architecture, behavior, and file paths.

Gimmick, the researchers say, was configured to communicate solely with its Google Drive-based C&C server, and only during work days, to blend in with the target organization’s network traffic.

[ READ: New Cross-Platform Backdoor ‘SysJoker’ Used in Targeted Attacks ]

Analysis of the malware shows that its operation is highly asynchronous and that the attackers maintain a Google Drive directory for each of the infected hosts.

Volexity has identified directories used to store credentials, errors, proxy definitions, command files, and temporary files, among others, but says that not all Gimmick variants make use of all of these directories.

The malware can receive C&C commands to harvest system information, upload or download files, and execute shell commands, as well as to perform additional C&C operations.

Gimmick, the researchers note, is a complex malware family, mainly due to its asynchronous design, and its porting to macOS suggests that Storm Cloud – which is the only threat actor observed using it – is a well-resourced and versatile adversary.

Last week, Apple released new signatures to XProtect and MRT to protect Macs from Gimmick, Volexity says.

Related: Chinese Hackers Target Financial Institutions in Taiwan With Custom Backdoor

Related: Symantec: Super-Stealthy ‘Daxin’ Backdoor Linked to Chinese Threat Actor

Related: Stealthy ‘SockDetour’ Backdoor Used in Attacks on U.S. Defense Contractors

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.