Categories: Cyber Security News

Emerging XCSSET Variant Threatens macOS App Developers

Microsoft Threat Intelligence has identified a sophisticated new variant of the XCSSET malware, which poses significant risks to macOS developers working with Xcode projects.

This latest iteration introduces enhanced obfuscation techniques, expanded data exfiltration capabilities, and advanced persistence mechanisms that build upon the threat’s evolution since its initial documentation in March 2025.

The malware operates through a four-stage infection chain, targeting Xcode development environments by embedding malicious code within project files.

When developers build infected projects, XCSSET executes silently in the background, leveraging the trust developers place in shared code repositories and collaborative development practices.

Advanced Evasion and Persistence Techniques

This variant employs run-only compiled AppleScripts to evade detection, making traditional reverse engineering significantly more challenging.

The malware utilizes AES encryption with a hardcoded key (27860c1670a8d2f3de7bbc74cd754121) to secure communications with command-and-control servers, demonstrating sophisticated operational security practices.

boot() function of the earlier variant

A particularly concerning feature is the clipboard monitoring submodule that targets cryptocurrency transactions. The malware downloads configuration files containing regex patterns for various digital wallet addresses.

When users copy wallet addresses to their clipboard, XCSSET can substitute them with attacker-controlled addresses, potentially redirecting cryptocurrency transactions worth substantial amounts.

The malware establishes persistence through LaunchDaemon entries, creating fake applications that masquerade as legitimate system components, such as “System Settings.app.”

These malicious applications execute when the genuine System Settings launches, providing continuous system access while appearing legitimate to users and security tools.

Expanded Data Theft Capabilities

XCSSET now targets Firefox browser data through a modified version of the HackBrowserData project, a legitimate tool capable of extracting passwords, browsing history, credit card information, and cookies.

This expansion beyond Safari and Chrome significantly increases the malware’s data collection potential across macOS systems.

The malware deliberately disables critical macOS security features, including automatic configuration updates and Rapid Security Response mechanisms. These actions leave infected systems vulnerable to additional threats by preventing Apple’s security patches from installing automatically.

Communication with command-and-control infrastructure occurs through domains including cdntor.ru, checkcdn.ru, cdcache.ru, and applecdn.ru, which attempt to blend malicious traffic with legitimate content delivery network requests.

Defense Recommendations

Organizations should implement comprehensive Xcode project verification procedures, examining all downloaded or cloned repositories for malicious modifications.

Microsoft recommends deploying Microsoft Defender for Endpoint on Mac, which can detect and quarantine XCSSET variants through behavioral analysis and signature-based detection.

Developers should exercise extreme caution when copying sensitive data, particularly cryptocurrency addresses, and verify the contents of the clipboard before pasting.

Regular system updates and enabling cloud-delivered protection in Microsoft Defender Antivirus provide additional layers of defense against this evolving threat targeting the macOS development ecosystem.

Indicators of compromise

Indicator Type Description
cdntor[.]ru Domain C2 server
checkcdn[.]ru Domain C2 server
cdcache[.]ru Domain C2 server
applecdn[.]ru Domain C2 server
flowcdn[.]ru Domain C2 server
elasticdns[.]ru Domain C2 server
rublenet[.]ru Domain C2 server
figmastars[.]ru Domain C2 server
bulksec[.]ru Domain C2 server
dobetrix[.]ru Domain C2 server
figmacat[.]ru Domain C2 server
digichat[.]ru Domain C2 server
diggimax[.]ru Domain C2 server
cdnroute[.]ru Domain C2 server

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Emerging XCSSET Variant Threatens macOS App Developers appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131)…

5 minutes ago

New iOS Exploit With Advanced iPhone Hacking Tools Attacking Users to Steal Personal Data

A sophisticated full-chain iOS exploit kit dubbed DarkSword, actively deployed by multiple commercial surveillance vendors and…

5 minutes ago

The High Cost of Slow Triage: How to Make Tier 1 the Fastest Layer in Your SOC

Why do so many SOCs still struggle to move quickly even with strong detection tools…

5 minutes ago

Tennessee Republican objects to checking public school kids’ immigration status

A bill requiring public schools to check the immigration status of all kids in grades…

21 minutes ago

AliExpress Has a 750W Peak 36V Adult Electric Bike for Just $269 With Free Delivery

Now is the time to retire that pedal-powered bike of yours and upgrade to electric.…

60 minutes ago

This Crazy TMNT Shredder Combo Can Basically Ruin an Entire Game of Magic In One Fell Swoop

Magic: The Gathering’s second set of the year has given us the Teenage Mutant Ninja…

60 minutes ago

This website uses cookies.