Site icon TheCyberThrone

CloudMensis ! A New macOS backdoor

Advertisements

Security researchers have found a new macOS backdoor dubbed CloudMensis  being used in targeted attacks to steal sensitive information from victims.

The threat exclusively uses public cloud storage services to communicate with its operators. Specifically, it leverages pCloud, Yandex Disk and Dropbox to receive commands and exfiltrate files, according to the security vendor.

Advertisements

Once the backdoor gains code execution and administrative privileges, it runs first-stage malware which in turn retrieves a more feature-rich second stage from a cloud storage service. This larger, second component can issue 39 commands including document exfiltration, taking screenshots, and lifting email attachments and other sensitive data.

CloudMensis’ capabilities include screenshots, exfiltration of documents and keystrokes, as well as listing email messages, attachments, and files stored from removable storage.

The malware comes with support for dozens of commands, allowing its operators to perform a long list of actions on infected Macs.

Metadata obtained from the three impacted cloud storage services indicates that commands began to be issued to victim machines on February 4, 2022.

Advertisements

The threat actors behind this campaign are exploiting vulnerabilities to circumvent macOS mitigations. System administrators were therefore urged to ensure any corporate Macs are running an up-to-date OS to help mitigate the threat.

This research was done and documented by researchers from ESET

Indicators Of Compromise

Paths

Exit mobile version