• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts warn of macos backdoor hidden in pirated versions of

Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software

You are here: Home / General Cyber Security News / Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software
January 19, 2024

Pirated purposes targeting Apple macOS end users have been noticed made up of a backdoor capable of granting attackers remote regulate to infected machines.

“These purposes are becoming hosted on Chinese pirating sites in get to gain victims,” Jamf Menace Labs researchers Ferdous Saljooki and Jaron Bradley mentioned.

“As soon as detonated, the malware will obtain and execute several payloads in the track record in order to secretly compromise the victim’s device.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The backdoored disk picture (DMG) data files, which have been modified to establish communications with actor-controlled infrastructure, include legitimate program like Navicat Premium, UltraEdit, FinalShell, SecureCRT, and Microsoft Distant Desktop.

Cybersecurity

The unsigned applications, aside from being hosted on a Chinese internet site named macyy[.]cn, integrate a dropper ingredient termed “dylib” that’s executed every time the software is opened.

The dropper then functions as a conduit to fetch a backdoor (“bd.log”) as very well as a downloader (“fl01.log”) from a distant server, which is employed to established up persistence and fetch more payloads on the compromised equipment.

The backdoor – prepared to the route “/tmp/.take a look at” – is thoroughly-showcased and developed atop an open up-supply submit-exploitation toolkit referred to as Khepri. The simple fact that it is located in the “/tmp” directory signifies it will be deleted when the system shuts down.

That reported, it will be developed once again at the identical site the subsequent time the pirated software is loaded and the dropper is executed.

On the other hand, the downloader is written to the concealed route “/End users/Shared/.fseventsd,” adhering to which it generates a LaunchAgent to ensure persistence and sends an HTTP GET request to an actor-managed server.

Whilst the server is no longer obtainable, the downloader is made to create the HTTP reaction to a new file situated at /tmp/.fseventsds and then launch it.

Cybersecurity

Jamf reported the malware shares numerous similarities with ZuRu, which has been observed in the past spreading by means of pirated apps on Chinese sites.

“It is really attainable that this malware is a successor to the ZuRu malware provided its focused purposes, modified load instructions and attacker infrastructure,” the scientists reported.

Found this report exciting? Adhere to us on Twitter  and LinkedIn to read more exclusive written content we submit.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «preventing data loss: backup and recovery strategies for exchange server Preventing Data Loss: Backup and Recovery Strategies for Exchange Server Administrators
Next Post: Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware invoice phishing alert: ta866 deploys wasabiseed & screenshotter malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.