Tuesday, June 6, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Many of 13 New Mac Malware Families Discovered in 2022 Linked to China

Researcher by Researcher
January 7, 2023
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


More than a dozen new Mac malware families were discovered in 2022, including information stealers, cryptocurrency miners, loaders, and backdoors, and many of them have been linked to China.

Mac security expert Patrick Wardle has compiled a list of the macOS malware that came to light over the course of last year. The number of new malware appears to be increasing as only eight new families were spotted in 2021.

The first malware to emerge in 2022 was SysJoker, a cross-platform backdoor used by an APT actor in targeted attacks. SysJoker, observed targeting an educational institution, can download and execute other malicious components.

The second macOS malware, DazzleSpy, was used as part of a state-sponsored cyberespionage campaign aimed at pro-democracy activists in Hong Kong. The malware has been described as a backdoor and information stealer, and the main suspect behind these attacks is China.

Another new piece of malware, which may be linked to DazzleSpy, has been named VPN Trojan (Covid) and it has been described as a persistent backdoor that can download and execute second stage payloads directly from memory.

The malware named oRAT has also been linked to a Chinese APT group. The Go-written threat has a long list of espionage-related capabilities, but the analyzed sample did not have any persistence mechanism.

A Chinese cyberespionage group is also believed to be behind a macOS backdoor named Rshell, which has been delivered through a supply chain attack. The malware can execute commands in a shell and steal information.

The malware known as Gimmick has also been tied to Chinese cyberspies. The backdoor uses cloud providers for command and control (C&C).

China has also been mentioned in a report describing a new attack framework dubbed Alchimist, which targets Windows, Linux and macOS devices. The remote access trojan (RAT) delivered by the attackers, named Insekt, can execute commands and collect information, but the macOS version has not been recovered so its exact capabilities are unknown.

CloudMensis has been used to steal valuable information from compromised systems, including documents, screenshots and keystrokes. The malware exploited older vulnerabilities, which suggests it has been around for several years.

Three of the new Mac malware families identified in 2022 relied on typosquatting to spread. CrateDepression leveraged the popularity of a Rust crate to spread and it deployed other payloads on compromised systems. Pymafka posed as a popular Python package for delivery and installed a Cobalt Strike agent. SentinelSneak was disguised as a SentinelOne SDK and attempted to exfiltrate sensitive data from infected devices.

The list of new macOS malware also includes KeySteal, a keychain stealer delivered via trojanized versions of a free app, and the cryptocurrency miner CoinMiner, which uses various open source components and I2P for stealthy communications.

Related: Microsoft Says Mac Trojan Becoming Stealthier, More Menacing

Related: Repurposing Mac Malware Not Difficult, Researcher Shows

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:
Tags:





Source link

Related articles

Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
Tags: ChinadiscoveredFamiliesLinkedMacmalware
Share76Tweet47

Related Posts

Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
0

Cloud computing brings many business benefits, but it’s essential to know how to protect your data and operations. Image: StackCommerce...

Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
0

Podcast Ransomware Task Force Ransomware Decipher Podcast: Megan Stifel Returns Megan Stifel, chief strategy officer for the Institute for Security...

Sentra Raises $30 Million for DSPM Technology

Galvanick Banks $10 Million for Industrial XDR Technology

June 5, 2023
0

Galvanick, an early-stage startup working on an Extended Detection & Response (XDR) platform for industrial infrastructure, has scored $10 million...

How to know what personal information Microsoft Edge knows about you

How to know what personal information Microsoft Edge knows about you

June 5, 2023
0

Users should be aware of what personal data is being collected and stored by Microsoft Edge and be prepared to...

FBI: Election Officials in Nine States Received Phishing Emails

Q&A: Megan Stifel | Decipher

June 4, 2023
0

"In many ways it's a heartbreaking problem, that small and medium-sized enterprises who are the lifeblood of the U.S. economy...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
Sentra Raises $30 Million for DSPM Technology

Galvanick Banks $10 Million for Industrial XDR Technology

June 5, 2023
BNP Paribas and NatWest Go Live with CobaltFX’s ‘Dynamic Credit’ for FX Credit Management

BNP Paribas and NatWest Go Live with CobaltFX’s ‘Dynamic Credit’ for FX Credit Management

June 5, 2023

Recent Posts

Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
Sentra Raises $30 Million for DSPM Technology

Galvanick Banks $10 Million for Industrial XDR Technology

June 5, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved