Loading cryptocurrency prices...

New XCSSET macOS Malware Variant Targets Firefox, Steals Crypto

XCSSET Malware Returns: New macOS Variant Targets Browsers, Cryptocurrency Wallets, and Developer Projects

  • Researchers found an updated variant of the XCSSET Malware targeting macOS systems.
  • The malware now includes new methods for browser targeting, clipboard monitoring, and persistence.
  • This version enhances encryption, uses stealthier AppleScripts, and collects data from Firefox browsers.
  • It can change copied cryptocurrency wallet addresses to redirect transactions to attacker-controlled wallets.
  • Users are advised to keep systems updated and be cautious with Xcode projects and clipboard content.

Researchers with the Microsoft Threat Intelligence team reported the discovery of a new variant of XCSSET, a sophisticated malware that targets Apple macOS. The malware, active in limited attacks, brings updates focusing on browser data theft, clipboard hijacking, and maintaining persistence on infected devices.

- Advertisement -

The updated XCSSET uses advanced encryption, obfuscation and run-only AppleScripts for stealth, according to Microsoft’s report published Thursday. It can now access and steal data from Mozilla Firefox browsers, and establishes persistence through LaunchDaemon entries, which help the malware stay active on a compromised system.

The new variant expands its data theft options and includes a clipper module that looks for cryptocurrency wallet addresses in the clipboard and swaps them with addresses controlled by attackers, Microsoft said. When users copy a cryptocurrency address, the malware detects this pattern and replaces it, aiming to redirect funds if a transaction occurs. The malware also uses a staged infection process, with the final stage involving an AppleScript app running commands to gather system information and activate modules via a function called boot().

Notable changes in this version include more checks for Firefox and modifications to detect the presence of the Telegram app. The malware’s structure now includes new modules: one for setting up LaunchDaemon (xmyyeqjx), another for Git-based persistence (jey), and a reworked information module that includes the clipboard hijacker (vexyeqj). It also uses a tool based on the open-source HackBrowserData project to extract Firefox data.

XCSSET targets Xcode projects—files used by developers to create macOS applications. While distribution methods are not fully known, sharing infected Xcode projects is believed to be the main route. Microsoft previously noted enhancements in XCSSET’s error handling and the use of multiple techniques to remain on a compromised host.

- Advertisement -

To reduce risk from XCSSET, experts recommend keeping operating systems up to date, carefully reviewing Xcode projects from third parties, and exercising care when copying sensitive cryptocurrency information.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

US Senate Budget Deal Near as Crypto Market Awaits Shutdown End

The US Senate has reached a deal on a three-part budget to end the...

XRP Surges 300% in 2024, Rally Set to Continue Despite Dip

XRP has surged nearly 300% since November 2024, despite a recent 7% drop.The resolution...

Bitcoin Surges Past $105K After JPMorgan’s Big Bet, Trump Stimulus

The Bitcoin Price recovered to about $105,000 after a 20% drop below that level.JPMorgan...

Ethereum Gas Fees Plummet to 0.067 Gwei After Market Crash

Ethereum layer-1 gas fees dropped to 0.067 Gwei amid reduced market activity in October...

Bitcoin Nears $100K Amid Rising AI and Crypto Market Volatility

Bitcoin Price briefly fell below $100,000 in November before stabilizing, reflecting ongoing crypto volatility.The...
- Advertisement -

Must Read

How Much Money Do You Need To Start In Crypto?

TL;DR -If you are wondering How Much Money Do You Need To Start In Crypto, note that is less than you are probably thinking....