New Malware for Mac that spreads by Xcode projects

Malware on Mac

Security researchers have revealed, with the discovery of XCSSET malware, that it uses Xcode projects to be able to test itself through our Macs. The big problem is that it is still not really known what are the means by which it is actually spread. The attack of this Malware focuses on the browsers that are installed on the Mac. Both Safari and any other, such as Opera, Crhome ... etc, to acquire useful user data.

Trend Micro researchers discovered what they have termed as "an unusual infection related to Xcode developer projects. ' The malware would be incorporated into the project itself and therefore has multiple payload possibilities, and while it poses a potential risk to end users using software developed through Apple ID, it actually seems to be a bigger problem for the developers themselves.

Malware, which is part of the XCSSET family, was found to embed files that they suggested would allow a "command and control" of a target system, namely, that it would allow the attacker using the malware to take control of the infected Mac. This can allow a wide variety of actions to be taken on infected systems, including acquiring personal data and carrying out a ransomware-style attack that involves encryption.

The team states that what is truly rare is the way it is spreading. It has been found that is including in local Xcode projects and when the project is built, the malicious code is executed.

For now, you have to be careful with the projects that are shared through GitHub, for example. It is more than likely that they will take advantage of this platform to continue spreading Malware and thus be able to access as many users as possible. Researchers estimate that today most infected Macs are in China and India.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.