Article Details

Scrape Timestamp (UTC): 2025-09-26 09:12:22.587

Source: https://thehackernews.com/2025/09/new-macos-xcsset-variant-targets.html

Original Article Text

Click to Toggle View

New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module. Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in limited attacks. "This new variant of XCSSET brings key changes related to browser targeting, clipboard hijacking, and persistence mechanisms," the Microsoft Threat Intelligence team said in a Thursday report. "It employs sophisticated encryption and obfuscation techniques, uses run-only compiled AppleScripts for stealthy execution, and expands its data exfiltration capabilities to include Firefox browser data. It also adds another persistence mechanism through LaunchDaemon entries." XCSSET is the name assigned to a sophisticated modular malware that's designed to infect Xcode projects used by software developers and unleash its malicious capabilities when it's being built. Exactly how the malware is distributed remains unclear, but it's suspected that the propagation relies on the Xcode project files being shared among developers building apps for macOS. Earlier this March, Microsoft uncovered several enhancements to the malware, highlighting its improved error handling and the use of three different persistence techniques to siphon sensitive data from compromised hosts. The latest variant of XCSSET has been found to incorporate a clipper sub-module that monitors clipboard content for specific regular expression (aka regex) patterns matching various cryptocurrency wallets. In the event of a match, the malware proceeds to substitute the wallet address in the clipboard with an attacker-controlled one to reroute transactions. The Windows maker also noted that the new iteration introduces changes to the fourth stage of the infection chain, particularly where an AppleScript application is used to run a shell command to fetch the final-stage AppleScript that's responsible for collecting system information and launching various sub-modules using a boot() function. Notably, the modifications include extra checks for the Mozilla Firefox browser and an altered logic to determine the presence of the Telegram messaging app. Also observed are changes to the various modules, as well as new modules that did not exist in previous versions - To mitigate the threat posed by XCSSET, users are recommended to ensure that they keep their system up-to-date, inspect Xcode projects downloaded or cloned from repositories or other sources, and exercise caution when it comes to copying and pasting sensitive data from the clipboard.

Daily Brief Summary

MALWARE // New XCSSET Variant Targets macOS with Advanced Clipper and Persistence

Microsoft Threat Intelligence reports a new XCSSET variant targeting macOS, emphasizing browser data exfiltration and clipboard hijacking, specifically affecting Firefox users.

The malware uses sophisticated encryption and obfuscation, leveraging run-only compiled AppleScripts for stealth, and expands its persistence via LaunchDaemon entries.

XCSSET infects Xcode projects, potentially spreading through shared developer files, though the exact distribution method remains uncertain.

Enhancements include a clipper sub-module monitoring clipboard content for cryptocurrency wallet patterns, substituting addresses to reroute transactions.

The latest version modifies the infection chain, using AppleScript to execute shell commands and collect system information, with added checks for Firefox and Telegram.

New modules and altered logic in the malware's structure suggest ongoing evolution and adaptation to bypass security measures.

Users are advised to maintain updated systems, scrutinize Xcode projects, and exercise caution with clipboard data to mitigate risks associated with XCSSET.