UpdateAgent Returns with New macOS Malware Dropper Written in Swift

News

A new variant of the macOS malware tracked as UpdateAgent has been spotted in the wild, indicating ongoing attempts on the part of its authors to upgrade its functionalities.

“Perhaps one of the most identifiable features of the malware is that it relies on the AWS infrastructure to host its various payloads and perform its infection status updates to the server,” researchers from Jamf Threat Labs said in a report.

UpdateAgent, first detected in late 2020, has since evolved into a malware dropper, facilitating the distribution of second-stage payloads such as adware while also bypassing macOS Gatekeeper protections.

The newly discovered Swift-based dropper masquerades as Mach-O binaries named “PDFCreator” and “ActiveDirectory” that, upon execution, establish a connection to a remote server and retrieve a bash script to be executed.

CyberSecurity

“The primary difference [between the two executables] is that it reaches out to a different URL from which it should load a bash script,” the researchers noted.

These bash scripts, named “activedirec.sh” or “bash_qolveevgclr.sh“, include a URL pointing to Amazon S3 buckets to download and run a second-stage disk image (DMG) file to the compromised endpoint.

“The continued development of this malware shows that its authors continue to remain active, trying to reach as many users as possible,” the researchers said.

Products You May Like

Articles You May Like

LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
Ransomware Attack Exposes Data of 5.6 Million Ascension Patients
Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks

Leave a Reply

Your email address will not be published. Required fields are marked *