XCSSET first came into the spotlight in August 2020, when it was spotted inside Apple projects developed using the free Xcode integrated development environment (IDE (opens in new tab)). A variant (opens in new tab) of the malware was then discovered designed specifically to target M1-powered Macs (opens in new tab).
Now, cybersecurity (opens in new tab) researchers at Trend Micro (opens in new tab) have once again found an updated version of the malware that’s taken on new features and can target popular apps including Telegram and Google Chrome (opens in new tab).
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and you can also choose to enter the prize draw to win a $100 Amazon voucher or one of five 1-year ExpressVPN subscriptions.
>> Click here to start the survey in a new window (opens in new tab) <<
- These are the best malware removal (opens in new tab) software on the market
- Protect your devices with these best antivirus software (opens in new tab)
- Here are the best ransomware protection tools (opens in new tab)
“The changes we’ve encountered in XCSSET do not reflect a fundamental change in its behavior but do constitute refinements in its tactics,” note the researchers in a blog post (opens in new tab) analyzing XCSSET’s information stealing capabilities.
The XCSSET malware is particularly troublesome since its infection mechanism can be used to launch supply-chain-like attacks.
The malware works by injecting malicious code into local Xcode projects, which executes every time the project is built. This poses an issue not just for the developers, but also for any downstream users that run the software infected with the malware.
Trend Micro has been monitoring the malware since last year and recently learnt how it steals information. Using the examples of Telegram and Google Chrome, the researchers explained how the malware exfiltrates information to its command and control (C2) servers.
“Not all executable files are sandboxed on macOS, which means a simple script can steal all the data stored in the sandbox directory,” say the researchers, asking application developers not to store sensitive data, such as login information, in the sandbox directory.
Besides Telegram, and Chrome, Trend Micro also found scripts that targeted other popular apps as well including Opera (opens in new tab), Skype (opens in new tab), Evernote (opens in new tab), WeChat, and more.
- We've put together a list of the best endpoint protection (opens in new tab) software