Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New RustyAttr malware targets macOS via advanced attribute abuse
Global Security

New RustyAttr malware targets macOS via advanced attribute abuse

AdminBy AdminNovember 14, 2024No Comments3 Mins Read
RustyAttr Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 14, 2024Ravi LakshmananCryptojacking / Threat Intelligence

RustyAttr malware

Threat actors have been found to be using a new technique that abuses macOS extended file attributes to smuggle a new malware called RustyAttr.

A Singaporean cyber security company has attributed to new activity with moderate credibility for the notorious North Korea-linked Lazarus Group, citing infrastructural and tactical overlaps seen with previous campaigns, including RustBucket.

Extended attributes refer to additional metadata associated with files and directories that can be extracted using a special command called xattr. They are often used to store information beyond standard attributes such as file size, timestamps, and permissions.

Cyber ​​security

The malware detected by Group-IB is created using Difficultiescross-platform framework for desktop applications, and signed by a leaked certificate that has since been revoked by Apple. They include an extended attribute that is configured to retrieve and run a shell script.

Executing the shell script also triggers a decoy that serves as a distraction mechanism by displaying a “This app doesn’t support this version” error message or a seemingly innocuous PDF document related to the development and funding of game projects.

RustyAttr malware

“Once the application is executed, Tauri tries to render the HTML web page using WebView,” said Sharmin Lowe, Group-IB security researcher. “(The threat actor) used some random pattern taken from the Internet.”

But it’s also worth noting that these web pages are designed to load malicious JavaScript, which then fetches the content of the extended attributes and executes it using the Rust backend. However, the spoofed web page ends up being rendered only in cases where there are no extended attributes.

The ultimate purpose of the campaign remains unclear, especially in light of the fact that there was no evidence of further payloads or confirmed casualties.

Cyber ​​security

“Fortunately, macOS systems provide some level of protection for found samples,” Lowe said. “To trigger an attack, users must disable Gatekeeper by disabling malware protection. It is likely that some degree of engagement and social engineering will be required to convince victims to take these steps.”

The development is the same as the North Korean threat actors attraction Art broad companies who strive safe remote positions with companies around the world, as well as tricking current employees working at cryptocurrency companies into downloading malware under the guise of a coding interview.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.