Monday, October 6, 2025

Microsoft warns of recent XCSSET macOS malware variant focusing on Xcode devs


Microsoft Risk Intelligence reviews {that a} new variant of the XCSSET macOS malware has been detected in restricted assaults, incorporating a number of new options, together with enhanced browser focusing on, clipboard hijacking, and improved persistence mechanisms.

XCSSET is a modular macOS malware that acts as an infostealer and cryptocurrency stealer, stealing Notes, cryptocurrency wallets, and browser information from contaminated units. The malware spreads by looking for and infecting different Xcode tasks discovered on the system, in order that the malware is executed when the venture is constructed.

“The XCSSET malware is designed to contaminate Xcode tasks, usually utilized by software program builders, and run whereas an Xcode venture is being constructed,” explains Microsoft.

“We assess that this mode of an infection and propagation banks on venture information being shared amongst builders constructing Apple or macOS-related purposes.”

In a brand new variant noticed by Microsoft, researchers have famous a number of adjustments.

It now makes an attempt to steal Firefox browser information by putting in a modified construct of the open-source HackBrowserData device, which is used to decrypt and export browser information from browser information shops.

The brand new variant additionally features a clipboard-hijacking element replace that screens the macOS clipboard for normal expression patterns related to cryptocurrency addresses.

When a crypto handle is detected, it is going to change the handle with one belonging to the attacker. This causes any cryptocurrency despatched by the consumer on an contaminated system to be despatched to the attackers as an alternative.

Attacker's cryptocurrency addresses used with the Clipboard hijacker
Attacker’s cryptocurrency addresses used with the Clipboard hijacker
Supply: Microsoft

The malware additionally contains new persistence strategies, similar to creating LaunchDaemon entries that execute a ~/.root payload and create a faux System Settings.app in /tmp to masquerade its exercise.

The brand new variant just isn’t but widespread, and Microsoft reviews that it has solely noticed it in restricted assaults. The researchers have additionally shared their findings with Apple and are working with GitHub to take away related repositories.

To guard towards one of these malware, it is suggested to maintain macOS and apps updated, particularly contemplating XCSSET has beforehand exploited vulnerabilities, together with zero-days.

Microsoft additionally recommends that builders all the time examine Xcode tasks earlier than constructing them, particularly once they have been shared with you by others.

46% of environments had passwords cracked, practically doubling from 25% final yr.

Get the Picus Blue Report 2025 now for a complete have a look at extra findings on prevention, detection, and information exfiltration traits.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com