Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

The malware now uses a four-stage infection chain, has an additional persistence mechanism, and also targets Firefox browser data.

macOS malware

An updated variant of the sophisticated XCSSET macOS malware is monitoring the system clipboard to hijack cryptocurrency transactions, Microsoft warns.

First observed in the wild half a decade ago, XCSSET spreads via malicious Xcode projects, abusing Apple’s integrated development environment for macOS.

The malware was designed to steal information from various chat applications, steal files, inject code in websites, and drop ransom notes, and has received several updates over time.

The most recent variant, Microsoft says, includes an additional persistence mechanism and brings changes to browser targeting and clipboard hijacking.

The threat employs a four-stage infection chain, with changes to its boot function, which now includes additional checks for Firefox and a modified check for Telegram.

At the fourth stage of the chain, the malware fetches a run-only compiled AppleScript that defines functions related to data validation, encryption, decryption, and for obtaining additional data from the command-and-control (C&C) server.

The script also contains functions associated with clipboard monitoring, which allows it to identify cryptocurrency addresses and replace them with content defined in a list of attacker-controlled addresses.

The malware was also seen fetching from the C&C another script with file exfiltration capabilities, and setting up LaunchDaemon persistence by creating a file containing the payload in the user’s home directory.

Advertisement. Scroll to continue reading.

It was also seen modifying system configurations to execute commands that disabled the macOS security configuration updates and Rapid Security Response mechanism.

XCSSET also creates a fake system settings application and then calls a function that waits for the legitimate System Settings application to be launched before executing the fake app, to pose as legitimate.

The new malware variant also includes an info-stealer module targeting the Firefox browser. A modified version of the HackBrowserData open source project, the module steals browser history, cookies, and stored passwords and credit card information.

Microsoft reported its findings to Apple and worked with GitHub to remove the malicious repositories distributing the malware.

“While we’re only seeing this new XCSSET variant in limited attacks as of this writing, we’re publishing our comprehensive analysis to increase awareness of this evolving threat,” the company notes.

Related: PyPI Warns Users of Fresh Phishing Campaign

Related: Widespread Infostealer Campaign Targeting macOS Users

Related: Microsoft Warns of Improved XCSSET macOS Malware

Related: North Korean Hackers Target macOS Users

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

See real-world examples of how attackers engage with LLMs. This session is for anyone securing, testing, or building AI systems, especially those using LLMs.

Register

This virtual event picks apart the various components of attack surface management strategy, the push to mandate continuous asset visibility and inventory tools, and the use of red-teaming, bug bounties and pen-tests in modern security programs.

Register

People on the Move

Todd Spight has joined HDI Global Insurance Company as its new Chief Information Security Officer.

Incident response and cyber readiness firm Sygnia has appointed Guy Segal as Chief Executive Officer.

Hatem Naguib has stepped down as CEO of Barracuda Networks and Rohit Ghai has been appointed the new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.