XCSSET Malware Threatens macOS Developer Community

XCSSET Malware Threatens macOS Developer Community

Threat Group: Unattributed
Threat Type: Malware, Supply Chain Attack
Exploited Vulnerabilities: Transparency Consent and Control (TCC) Zero-day Vulnerabilities
Malware Used: XCSSET
Threat Score: High (8.5/10) – Advanced obfuscation, persistent infection mechanisms, and supply-chain attack potential
Last Threat Observation: March 11, 2025 (Microsoft Security Blog)


Overview

XCSSET is a sophisticated, modular macOS malware first discovered in 2020, primarily known for infecting Xcode development projects. The latest variant detected exhibits advanced obfuscation, enhanced persistence strategies, and zero-day exploit capabilities, significantly increasing its threat potential. Recent campaigns have specifically targeted cryptocurrency and fintech industries, showcasing its evolving targeting strategies.

Key Details

  • Delivery Method: Infected Xcode projects
  • Targets: macOS developers, cryptocurrency, fintech sectors
  • Functions:
    • Cryptocurrency theft by manipulating wallet addresses
    • Credential theft, including chat logs and browser-stored passwords
    • System reconnaissance
    • Malicious JavaScript injection (UXSS attacks)
    • Data exfiltration from application sandbox directories
  • Obfuscation: Advanced encrypted scripting and misleading module naming

Attack Vectors

XCSSET uniquely spreads through compromised Xcode project files rather than typical phishing or direct downloads. Developers unwittingly execute the malware upon building infected projects, facilitating unnoticed propagation within collaborative development environments and potentially triggering widespread supply-chain attacks.

A recent campaign in December 2024 demonstrated the malware's targeted capabilities, specifically focusing on cryptocurrency and fintech companies.

Malware Functionalities

FunctionalityDescription
Data ExfiltrationSteals sensitive information from applications (e.g., Notes, Telegram, Chrome), specifically targeting digital wallets and credentials.
System Information GatheringCollects extensive system details (macOS version, SIP status, CPU info) for victim profiling and tailored attacks.
Screenshot CaptureCaptures screen content to obtain sensitive displayed information.
File Encryption & RansomwareEncrypts user files, displaying ransom demands, suggesting ransomware capabilities.
JavaScript Injection (UXSS)Injects malicious JavaScript to manipulate website content, intercept cryptocurrency transactions, and steal online credentials.

Evasion and Persistence Techniques

XCSSET incorporates sophisticated evasion and persistence strategies:

  • Obfuscation: Uses advanced encryption and randomized encoding (e.g., Base64, xxd).
  • Zero-Day Exploits: Leverages zero-day vulnerabilities in Apple's TCC to gain unauthorized access to sensitive macOS functionalities (e.g., microphone, webcam, screenshots).
  • Persistence Methods:
    • zshrc Modification: Injects malicious code into .zshrc_aliases to execute upon each shell session initiation.
    • Dock Method: Uses a signed version of dockutil to replace legitimate dock applications, embedding itself deeply in the system.
    • Git Integration: Ensures malware execution with each Git commit by embedding malicious scripts in repositories.

Indicators of Compromise (IoCs)

FileHash-SHA256

  • 25d226d5cb0c74ed5b1b85f12d53a4c2de2147ff464b2a35db03987015b11e24
  • 56670f51f94080f1ae45f2a433767f210f290835bf582e1a2e1876f1028832de
  • 8cec3c106659709017bb253becf68296c7bf13e76fa92b4450c281003d225645
  • c2a7970216576a6b8f74528ffcfa51aa2b72b7f3e4237d97715b1b5ba80b25ca
  • cc37a01d3351b3c166f04aec6f52849e909b0b9c8d55095d730c660691b1ba66
  • d338dc9a75a14753f57399815b5d996a1c5e65aa4eb203222d8c85fb3d74b02f
  • ea90c72e67f1c9a9231732119576a7dcb29471f7da428866187d4326e78097f2
  • f67e2a27f0d1a4667b065ab05f884ff881eb7627e9d458f97f2204647b339c6e
  • ff83f53a383ba3f1d6b002006adf16a7f0b3263185d56cb70104889874d67c5d

domain

  • bulknames[.]ru
  • castlenet[.]ru
  • chaoping[.]ru
  • devapple[.]ru
  • figmasol[.]ru
  • gigacells[.]ru
  • gizmodoc[.]ru
  • itoyads[.]ru
  • rigglejoy[.]ru
  • rutornet[.]ru
  • sigmate[.]ru
  • trixmate[.]ru
  • vivatads[.]ru
  • xccset[.]sd
  • xccset[.]se
  • xccset[.]sg
  • xccset[.]si
  • xccset[.]sj
  • xccset[.]sk
  • xcsset[.]sc
  • xcsset[.]se
  • xcsset[.]st

Mitigation and Prevention

Protective measures against XCSSET:

  • Regular Software Updates: Promptly apply updates for macOS and development tools.
  • Xcode Project Verification: Inspect projects from external sources for anomalies or suspicious scripts.
  • Advanced Security Solutions: Employ endpoint protection with behavior analytics capabilities.
  • Security Training: Educate developers about secure coding practices and third-party code risks.
  • Multi-Factor Authentication (2FA): Mandate 2FA for repository and critical data access.
  • Comprehensive Log Monitoring: Monitor and analyze logs for suspicious activities or unauthorized access attempts.

Risk Assessment

XCSSET's advanced infection mechanisms, exploitation of zero-day vulnerabilities, and adaptability to newer macOS environments (including Apple M1 chipsets) represent a substantial threat. Its unique targeting of collaborative software development environments increases the likelihood of extensive, undetected spread.

Conclusion

Organizations, particularly within software development and financial technology sectors, should prioritize comprehensive threat management strategies against XCSSET. Ongoing vigilance, secure coding practices, regular updates, and robust security protocols are essential for mitigating this evolving threat.

Sources: