Google chrome and Telegram Software now have been targeted by Nasty macOS Malware XCSSET

macOS Malware XCSSET
Share It On:

24th July 2021, Kathmandu

Google chrome and Telegram Software now have been targeted by Nasty macOS Malware XCSSET

Malware targeting the macOS operating system has been updated again, adding more functionality to its suite of tools, allowing you to collect and filter sensitive data stored in various applications (including applications such as Google Chrome and Telegram), as it further “improves their tactics. “

 XCSSET was discovered in August 2020 when it was discovered to use an unusual distribution method to target Mac developers, which involved injecting malicious payloads into Xcode executed when the project file was compiled into the Xcode IDE project.

In early April this year, XCSSET received an update that allowed malware authors to attack macOS 11 Big Sur and Macs running on the M1 chipset by circumventing new security policies set by Apple on the latest operating system.

“Malware downloads its own open tool from its C2 server, which has a temporary signature, and if it is on macOS version 10.15 and earlier, it will continue to use the system’s built-in open command to run the application,” Trends Micro researchers have noted above.

Now, according to a new article published by a cybersecurity company on Thursday, XCSSET is found to run a malicious AppleScript file to compress the folder containing the Telegram data (“~ / Library / Group Containers / 6N38VWS5BX.ru.keepcoder. Telegram “) to compress the file. The file is then uploaded to a remote server under your control, allowing the threat actor to log in with the victim’s account.

 Using Google Chrome, malicious software attempts to steal the passwords stored in the web browser. These passwords are also encrypted with a master password called the “secure storage key”, using a dialog box to trick users into granting root privileges. Fraud and abuse of elevated privileges Run an unauthorized shell command to retrieve the master key from the iCloud keychain, after which the content is decrypted and transferred to the server.

 In addition to Chrome and Telegram, XCSSET can also steal data from various applications (such as Evernote, Opera, Skype, WeChat, and Apple’s contacts and notes applications) by retrieving these data from their respective sandbox directories Valuable information.


Share It On:

Recent Posts

Nepal’s Cybersecurity Crisis: Are We Prepared for the Future?

Nepal’s Cybersecurity Crisis: Are We Prepared for the Future?

Share It On:8th January 2024, Kathmandu Is Nepal ready to combat cyber threats? Explore real incidents, vulnerabilities, and actionable strategies

Ngadi Group Power Limited Opens Application for 100% Rights Offering

Ngadi Group Power Limited Opens Application for 100% Rights Offering

Share It On:7th January 2024, Kathmandu Ngadi Group Power Limited has officially opened applications for its 100% rights share issuance

Skill Fest 2025 at Embark College: Workshops, Job Fair, & CEO Unplugged

Skill Fest 2025 at Embark College: Workshops, Job Fair, &

Share It On:7th January 2024, Kathmandu Glocal After School, an entity of Glocal Pvt. Ltd., is set to launch the

Kathmandu Trash Collection Race 2025: Maina Devi Foundation & Kumari Job Partner for Change

Kathmandu Trash Collection Race 2025: Maina Devi Foundation & Kumari

Share It On:7th January 2024, Kathmandu Maina Devi Foundation (MDF), a leading non-profit organization driving environmental initiatives in Nepal, has

Certified Ethical Hacking Workshop in Bharatpur, Chitwan: Advance Your Cybersecurity Career with CEH Certification

Certified Ethical Hacking Workshop in Bharatpur, Chitwan: Advance Your Cybersecurity

Share It On:7th January 2024, Kathmandu Are you looking to step into the dynamic field of cybersecurity or enhance your

Global Money Transfer Interaction Program Concludes in Nepal

Global Money Transfer Interaction Program Concludes in Nepal

Share It On:6th January 2024, Kathmandu To promote global money transfer and explore opportunities in information technology, the Nepal Deposit