Microsoft uncovers sleuthy new XCSSET MacOS malware campaign


- Microsoft warns of new version of the XCSSET infostealer
- It comes with new obfuscation, infection, and persistence techniques
- It was seen in “limited” attacks in the wild
A new variant of a known macOS malware is making rounds on the internet, targeting users through infected Xcode projects.
Researchers from the Microsoft Threat Intelligence team said that the modular malware is seen in “limited attacks” at this time, but suggested that people should still keep their guard up.
According to the researchers, this is the first upgrade to XCSSET in three years. It now has enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies.
You may like
Scrutinize Xcode projects
“These enhanced features add to this malware family’s previously known capabilities, like targeting digital wallets, collecting data from the Notes app, and exfiltrating system information and files,” Microsoft said.
Microsoft first reported of this new XCSSET strain in mid-February this year, and has now come forward with an in-depth analysis.
Xcode is Apple‘s official integrated development environment (IDE) for creating apps on macOS, iOS, iPadOS, watchOS, and tvOS. It includes a code editor, debugger, Interface Builder, and tools for testing and deploying apps.
In essence, XCSSET is an infostealer. It is capable of pulling system information and files, stealing digital wallet data, and grabbing information from the official Notes app.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
For obfuscation, XCSSET now uses a “significantly more randomized approach” for generating payloads to infect Xcode projects. When it comes to updated persistence mechanisms, the new variant uses two techniques: “zshrc”, and “dock”. Finally, for infection, there are now new methods for where the payload is placed in a target Xcode project.
“Users must always inspect and verify any Xcode projects downloaded or cloned from repositories, as the malware usually spreads through infected projects,” the company concluded. “They should also only install apps from trusted sources, such as a software platform’s official app store.”
The in-depth analysis of the malware and its modus operandi can be found on here.
You might also like
Microsoft warns of new version of the XCSSET infostealer It comes with new obfuscation, infection, and persistence techniques It was seen in “limited” attacks in the wild A new variant of a known macOS malware is making rounds on the internet, targeting users through infected Xcode projects. Researchers from the…
Recent Posts
- Mercedes-Benz is hedging its bets with rebooted CLA sedan
- Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
- Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
- Sony’s Dazzling New RGB LED TV Comes in 2026
- Revisiting the Apple Watch SE in 2025 left me with a long list of update requests
Archives
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010