New Stealthy “RustDoor” Backdoor Targeting Apple macOS Devices

0
479


Feb 10, 2024NewsroommacOS Malware / Cyber Threat

Apple macOS Devices

Apple macOS customers are the goal of a brand new Rust-based backdoor that has been working below the radar since November 2023.

The backdoor, codenamed RustDoor by Bitdefender, has been discovered to impersonate an replace for Microsoft Visual Studio and goal each Intel and Arm architectures.

The precise preliminary entry pathway used to propagate the implant is at present not identified, though it is mentioned to be distributed as FAT binaries that include Mach-O recordsdata.

Multiple variants of the malware with minor modifications have been detected thus far, seemingly indicating lively growth. The earliest pattern of RustDoor dates again to November 2, 2023.

It comes with a variety of instructions that permit it to assemble and add recordsdata, and harvest details about the compromised endpoint.

Cybersecurity

Some variations additionally embody configurations with particulars about what knowledge to gather, the listing of focused extensions and directories, and the directories to exclude.

The captured info is then exfiltrated to a command-and-control (C2) server.

The Romanian cybersecurity agency mentioned the malware is probably going linked to distinguished ransomware households like Black Basta and BlackCat owing to overlaps in C2 infrastructure.

“ALPHV/BlackCat is a ransomware household (additionally written in Rust), that first made its look in November 2021, and that has pioneered the general public leaks enterprise mannequin,” safety researcher Andrei Lapusneau mentioned.

In December 2023, the U.S. authorities introduced that it took down the BlackCat ransomware operation and launched a decryption instrument that greater than 500 affected victims can use to regain entry to recordsdata locked by the malware.

Found this text fascinating? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.



LEAVE A REPLY

Please enter your comment!
Please enter your name here