HomesecurityMalicious Mac software spreads through Xcode projects

Malicious Mac software spreads through Xcode projects

Xcode projects are used to spread a form of Mac malware that specializes in infringing on Safari and other browsers.

The XCSSET family of malware has been found in Xcode projects, "leading to a malicious payload hole," Trend Micro said on Thursday.

In a document (.PDF) exploring the wave of attacks, cybersecurity researchers said that an "unusual" infection in a developer project also involved the discovery of two zero-day vulnerabilities.

Xcode

Xcode is a free integrated development environment (IDE) used in macOS for software development and applications related to Apple.

Although it is not yet clear how XCSSET is "directed" to Xcode projects, Trend Micro says that once integrated, the malware runs when a project is created.

"Obviously, these systems will be used mainly by developers", The team noted. "These Xcode projects have been modified to execute malicious code. This eventually leads to εισαγωγή and running the main XCSSET malware on the affected system. "

Some affected developers have shared their projects on GitHub, which the researchers say could lead to "supply chain-type attacks on users who rely on these repositories as dependencies on their own projects."

Once on a vulnerable system, XCSSET boosts browsers, including the Safari version, using vulnerabilities to steal user data.

In the case of Safari, the first of the two errors is a flaw in the Data Vault. A bypass method was found that bypasses the macOS protection which applies to Safari cookie files via SSHD.

The second vulnerability is due to the way Safari WebKit works. Normally, starting the kit requires the user to submit their password, but a bypass has been found that can be used to perform malicious actions through the Safari browser which does not have a sandbox. It also seems possible to perform Dylib hijacking.

Security issues allow Safari cookies to be read and discarded, and these data packets are then used to inject JavaScript-based backdoors into displayed pages through a Universal Cross-site Scripting (UXSS) attack.

Trend Micro believes that the UXSS element of the attack chain could be used not only to steal general user information, but also as a means of modifying browser logins to display malicious websites, change encryption wallet addresses, collect Apple Store credit card information, and more. stealing credentials from sources like Apple ID, Google, Paypal and Yandex.

Malware can also steal a variety of other user data, such as Evernote content and communication from applications Skype, Telegram, QQ and WeChat.

In addition, XCSSET can capture screenshots, process data and send stolen files to a command and control server (C2), and also contains an ransomware unit for file encryption and extortion.

Only two Xcode projects were found to host the malware, along with 380 IP victims - most of which are located in China and India - but the carrier of the infection is still important.

Teo Ehchttps://www.secnews.gr
Be the limited edition.
spot_img

LIVE NEWS