New XCSSET macOS Malware Variant Targets Firefox, Steals Crypto

XCSSET Malware Returns: New macOS Variant Targets Browsers, Cryptocurrency Wallets, and Developer Projects

  • Researchers found an updated variant of the XCSSET Malware targeting macOS systems.
  • The malware now includes new methods for browser targeting, clipboard monitoring, and persistence.
  • This version enhances encryption, uses stealthier AppleScripts, and collects data from Firefox browsers.
  • It can change copied cryptocurrency wallet addresses to redirect transactions to attacker-controlled wallets.
  • Users are advised to keep systems updated and be cautious with Xcode projects and clipboard content.

Researchers with the Microsoft Threat Intelligence team reported the discovery of a new variant of XCSSET, a sophisticated malware that targets Apple macOS. The malware, active in limited attacks, brings updates focusing on browser data theft, clipboard hijacking, and maintaining persistence on infected devices.

- Advertisement -

The updated XCSSET uses advanced encryption, obfuscation and run-only AppleScripts for stealth, according to Microsoft’s report published Thursday. It can now access and steal data from Mozilla Firefox browsers, and establishes persistence through LaunchDaemon entries, which help the malware stay active on a compromised system.

The new variant expands its data theft options and includes a clipper module that looks for cryptocurrency wallet addresses in the clipboard and swaps them with addresses controlled by attackers, Microsoft said. When users copy a cryptocurrency address, the malware detects this pattern and replaces it, aiming to redirect funds if a transaction occurs. The malware also uses a staged infection process, with the final stage involving an AppleScript app running commands to gather system information and activate modules via a function called boot().

Notable changes in this version include more checks for Firefox and modifications to detect the presence of the Telegram app. The malware’s structure now includes new modules: one for setting up LaunchDaemon (xmyyeqjx), another for Git-based persistence (jey), and a reworked information module that includes the clipboard hijacker (vexyeqj). It also uses a tool based on the open-source HackBrowserData project to extract Firefox data.

XCSSET targets Xcode projects—files used by developers to create macOS applications. While distribution methods are not fully known, sharing infected Xcode projects is believed to be the main route. Microsoft previously noted enhancements in XCSSET’s error handling and the use of multiple techniques to remain on a compromised host.

- Advertisement -

To reduce risk from XCSSET, experts recommend keeping operating systems up to date, carefully reviewing Xcode projects from third parties, and exercising care when copying sensitive cryptocurrency information.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Trump Crypto Project Stablecoin Breaks Dollar Peg

World Liberty Financial, a Trump family crypto project, reported a "coordinated attack" that briefly...

Bitcoin Flashes Rare Buy Signals Amid Capitulation

Multiple indicators, like Bitcoin's Sharpe ratio hitting -40, signal extreme market capitulation historically seen...

Buterin Sells 10,000+ ETH as Foundation Begins Staking

The Ethereum Foundation has begun staking 70,000 ETH, with rewards going back to its...

Russia Targets Telegram CEO Durov With Terror Probe

Pavel Durov, the founder of Telegram, is the subject of a Russian criminal investigation...

Kazakhstan Diversifies Trade, Eyes High-Value Exports & BRICS Ties

Kazakhstan's Ministry of Trade and Integration reported a $160 billion domestic trade turnover and...

Must Read

Forex Trading Vs Crypto Trading: Which One Should You Choose?

So you're trying to decide between two types of trading: Forex and cryptocurrency.Forex trading is the big player in the trading world, with lots...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!