web analytics

New ReaderUpdate malware variants target macOS users – Source: securityaffairs.com

Rate this post

Source: securityaffairs.com – Author: Pierluigi Paganini

New ReaderUpdate malware variants, now written in Crystal, Nim, Rust, and Go, targets macOS users, SentinelOne warns.

SentinelOne researchers warn that multiple versions of the ReaderUpdate malware written in Crystal, Nim, Rust, and Go programming languages, are targeting macOS users.

ReaderUpdate is a macOS malware loader that has been active since 2020, the malicious code was first seen as a compiled Python binary and was spotted delivering Genieo adware.

it remained largely undetected until resurfacing in late 2024 with new variants written in Crystal, Nim, and Rust.

1/ As the holiday season approaches, we’ve identified a new suspicious binary written in Nim. It contacts a C2 server, gains persistence, and collects system information. While only one sample is currently detected by antivirus tools, many others remain undetected. Read more 👇 pic.twitter.com/H9gEFvuCHb

— Moonlock Lab (@moonlock_lab) December 18, 2024

SentinelOne says that the ReaderUpdate is currently distributed in five variants compiled from five different source languages.

Language ~Size Example SHA-1
Compiled Python 5.6Mb fe9ca39a8c3261a4a81d3da55c02ef3ee2b8863f
Go 4.5Mb 36ecc371e0ef7ae46f25c137aa0498dfd4ff70b3
Crystal 1.2Mb 86431ce246b54ec3372f08c7739cd1719715b824
Rust 400Kb 01e762ef8a10bbcda639ed62ef93b784268d925a
Nim 166Kb 21a2ec703a68382b23ce9ff03ff62dae07374222

New ReaderUpdate variants are spread via older infections and third-party downloads, often through trojanized apps like “DragonDrop.” All versions are Intel x86-only, requiring Rosetta 2 on Apple Silicon. Recent reports have analyzed Crystal, Nim, and Rust versions, while the Go variant is now being documented for the first time.

The Go variant of the malware analyzed by the researchers collects system hardware info for unique victim IDs and hides in ~/Library/Application Support/. The malware maintains persistence via a .plist file. It executes remote C2 commands, SentinelOne experts believe that the malicious code might be used to offer other threat actors Pay-Per-Install (PPI) or Malware-as-a-Service (MaaS).

The malware obfuscates strings and URLs to evade analysis.

“Throughout the binary, the developers obfuscate many of the strings, including the C2 URL and the property list content, using functions that either assemble characters on the stack or run some simple character substitution algorithm.” reads the report.

While Nim, Crystal, and Rust variants are widespread, the Go version is rarer, with only nine samples observed, linked to seven domains tied to broader malware infrastructure.

“ReaderUpdate is a widespread campaign utilising binaries written in a variety of different source languages, each containing its own unique challenges for detection and analysis. Interestingly, this loader platform has been quietly infecting victims through old infections that went largely unnoticed due to the malware remaining dormant or delivering little more than adware.” concludes the report.

“Nevertheless, where compromised, hosts remain vulnerable to the delivery of any payload the operators choose to deliver, whether of their own or sold as Pay-Per-Install or Malware-as-a-Service on underground markets.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)



Original Post URL: https://securityaffairs.com/175891/malware/readerupdate-malware-variants-targets-macos.html

Category & Tags: Breaking News,Cyber Crime,Malware,Cybercrime,Hacking,hacking news,information security news,IT Information Security,malware,Pierluigi Paganini,ReaderUpdate,Security News – Breaking News,Cyber Crime,Malware,Cybercrime,Hacking,hacking news,information security news,IT Information Security,malware,Pierluigi Paganini,ReaderUpdate,Security News

Views: 4

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post