"Experts Found Components of a Complex Toolkit Employed in macOS Attacks"

Researchers have discovered malicious files with backdoor capabilities, which they believe to be a component of a toolkit targeting Apple macOS systems. Researchers at Bitdefender found the set of malicious files with backdoor capabilities believed to be part of an advanced toolkit. According to the researchers, the investigation is ongoing, and the samples remain largely undetected. The researchers analyzed four samples submitted to VirusTotal, with the earliest sample uploaded on April 18, 2023, by an anonymous actor. Two of the three samples uploaded by a victim are backdoors written in Python that target Windows, Linux, and macOS. The first file identified by the researchers is "shared.dat," which, when executed, generates a unique device identifier UID and uses a routine to determine the operating system running on the target machine. The malware can be instructed to extract system information and run specific commands. This article continues to discuss researchers' discovery of malicious files with backdoor capabilities believed to be part of a toolkit targeting Apple macOS systems. 

Security Affairs reports "Experts Found Components of a Complex Toolkit Employed in macOS Attacks"

Submitted by Anonymous on