New macOS Malware Campaign Demonstrates Innovative Delivery Method

A new cyberattack campaign has cybersecurity experts raising alarm bells, as it employs cracked copies of popular software to spread a backdoor to macOS users.

macOS Malware Campaign Showcases Novel Delivery Technique


What sets this campaign apart from others is its scale and its unique method of delivering the malware in multiple stages. Unlike previous tactics, this campaign is targeting a wide range of macOS users, including those in business settings.


The Activator macOS backdoor was first discovered by Kaspersky in January 2024. SentinelOne later analyzed the malware's activity and found it spreading rapidly through torrents of macOS apps. According to Phil Stokes, a threat researcher at SentinelOne, the number of unique samples discovered in January exceeded that of any other macOS malware during the same period.

macOS Malware Campaign Showcases Novel Delivery Technique


The threat actor behind the campaign is using over 70 unique cracked macOS applications to distribute the malware. Many of these apps have titles that would appeal to business users, such as Snag It, Nisus Writer Express, and Rhino-8. This poses a significant risk to organizations that do not restrict software downloads by employees.


Typically, malware distributed through cracked apps is embedded directly into the software. However, the Activator campaign employs a different strategy. Users are provided with a cracked version of the desired app along with an "Activator" app containing malicious executables. When the user runs the Activator app and provides their admin password, macOS' Gatekeeper settings are disabled, allowing the malware to execute malicious actions.

macOS Malware Campaign Showcases Novel Delivery Technique

The multistage delivery process ensures that even if the user removes the cracked software later, the infection remains. Sergey Puzan, a malware analyst at Kaspersky, notes that the campaign also uses a Python backdoor launched directly from a loader script, making detection more challenging.


While it's unclear whether the goal of the campaign is to build a macOS botnet, the potential for significant in-the-wild infections is concerning. Despite the initial reports by Kaspersky, no further activity has been observed. However, cybersecurity experts urge macOS users to remain vigilant and avoid downloading cracked software to mitigate the risk of infection.


a security analyst wishes to implement a system that enforces access decisions to ensure that the privileges granted to an individual are appropriate for their role within the organization. which component is critical for enforcing these access control decisions?cybersecurity threatscrypto wormswhat is the secure coding technique that organizes data within the database for minimum redundancy?what is a fake antiviruswhich of the following is not true about cybersecurity?is google docs a cloud servicepsychological manipulation cyber securityinsider threats in cyber securityknowing yourself means identifying, examining, and understanding the threats facing the organization's information assets.which of the following devices is not connected to the internet of things?which of the following is true about the internet of things? i. the internet of things is the network of devices with the ability to connect and exchange data. ii. the internet of things increases our vulnerability to cyber attacks. iii. the internet of things is purely positive–there are no negative consequences to increased connectivityunderstanding the _____ context means understanding the impact of elements such as the business environment, the legal/regulatory/compliance environment, as well as the threat environment.internal security threatcybersecurity threats 2024



Post a Comment

Previous Post Next Post