Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

macOS Users Warned of New Versions of ReaderUpdate Malware

macOS users are targeted with multiple versions of the ReaderUpdate malware written in Crystal, Nim, Rust, and Go programming languages.

macOS malware

The threat actors behind the macOS malware loader known as ReaderUpdate have built new versions of the threat using the Crystal, Nim, Rust, and Go programming languages, SentinelOne reports.

Initially observed in 2020, when it was distributed as a compiled Python binary, the malware has been communicating with a command-and-control (C&C) server at www[.]entryway[.]world, and was seen deploying a payload identified as the Genieo (aka Dolittle and MaxOfferDeal) adware.

Since mid-2024, newer domains were associated with the Crystal, Nim, and Rust variants of ReaderUpdate, but the payload has not been changed, SentinelOne says. The Go variant the cybersecurity firm recently identified follows the same pattern.

“Including the original compiled Python version, ReaderUpdate is currently distributed in five variants compiled from five different source languages. We observed distribution of the newer variants through existing infections of the older ReaderUpdate,” SentinelOne notes.

The malware has been distributed via free and third-party software download sites, including through malicious package installers containing fake or trojanized utility applications. All observed variants only target the x86 Intel architecture.

Analysis of the Go variant of ReaderUpdate has revealed that, upon execution, the malware would first collect information on the system’s hardware, which is then used to create a unique identifier and sent to the C&C.

Additionally, it has revealed that the threat can parse and execute responses received from the C&C, which suggests that it could be used to execute any commands that its operator sends.

“While to date ReaderUpdate infections have only been associated with known adware, the loader has the capability to change the payload to something more malicious. This is consistent with a loader platform that might be used to offer other threat actors Pay-Per-Install (PPI) or Malware-as-a-Service (MaaS),” SentinelOne says.

Advertisement. Scroll to continue reading.

To date, the cybersecurity firm has identified nine ReaderUpdate samples written in Go, which reach out to seven C&C domains. This shows that this variant is not as common as the Nim, Crystal and Rust variants, which have hundreds of samples in the wild.

Related: Scareware Combined With Phishing in Attacks Targeting macOS Users

Related: New FrigidStealer macOS Malware Distributed as Fake Browser Update

Related: Microsoft Warns of Improved XCSSET macOS Malware

Related: Homebrew macOS Users Targeted With Information Stealer Malware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.