{"id":134341,"date":"2023-08-21T22:08:03","date_gmt":"2023-08-21T22:08:03","guid":{"rendered":"https:\/\/appleinsider.com\/articles\/23\/08\/21\/newest-xloader-threat-targets-work-environments?utm_medium=rss"},"modified":"2023-08-21T22:08:03","modified_gmt":"2023-08-21T22:08:03","slug":"newest-xloader-threat-targets-work-environments","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2023\/08\/21\/newest-xloader-threat-targets-work-environments\/","title":{"rendered":"Newest XLoader threat targets work environments"},"content":{"rendered":"<div class=\"col-sm-12\" id=\"article-hero\" aria-labelledby=\"hero-cap\" role=\"figure\">\n<p id=\"hero-cap\" class=\"hero-caption\" title=\"Microsoft Word app icon\">Microsoft Word app icon<\/p>\n<p> <a href=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2023\/08\/newest-xloader-threat-targets-work-environments.jpg\"> <img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2023\/08\/newest-xloader-threat-targets-work-environments.jpg\" alt> <\/a> <\/div>\n<p class=\"col-sm-12 article-lead\">XLoader is a malware tool that has been around for years, and now it is creeping out of the dark yet again with a focus on work environments.\n<\/p>\n<div class=\"col-sm-12\">\n<p>XLoader is one of the more common tools that attackers utilize to try and gain information from infected systems. When XLoader appeared on <a href=\"https:\/\/appleinsider.com\/inside\/macos\" title=\"macOS\" data-kpt=\"1\">macOS<\/a> in 2021, it <a href=\"https:\/\/appleinsider.com\/articles\/21\/07\/21\/virulent-windows-xloader-malware-is-now-on-macos\">was billed<\/a> as the fourth most-used tool that year.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Unlike in 2021, this latest XLoader variant is not intended strictly for the Java Runtime Environment, which means it has the potential to be much more dangerous. This latest form is written in the C and Objective C programming languages, and as <a href=\"https:\/\/www.sentinelone.com\/blog\/xloaders-latest-trick-new-macos-variant-disguised-as-signed-officenote-app\/\">noted by<\/a> SentinelOne, signed with an Apple developer signature.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>XLoader&#8217;s latest cover is a Microsoft-branded Office productivity app called &#8220;OfficeNote.&#8221; It&#8217;s being distributed within a standard Apple disk image named &#8220;OfficeNote.dmg,&#8221; which is automatically something you should be on the lookout for, especially in a work environment.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>The developer signature is &#8220;MAIT JAKHU (54YDV8NU9C),&#8221; another key detail to be aware of.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>According to the original report, Apple has already revoked that particular developer signature. However, SentinelOne says, &#8220;Apple&#8217;s malware blocking tool, XProtect, does not have a signature to prevent execution of this malware&#8221; at the time of publication.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>This particular malware tool has apparently been widely distributed as of July of 2023, when it first cropped up.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>And macOS malware tools run a premium, based on advertisements found on crimeware forums. Renting this XLoader variant is going for $199 per month, or $299 for three months.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Compare that to the $59 per month, or $129 for three months the Windows-based version typically rents for.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>If a person does install the XLoader malware tool onto their system, it will immediately target two popular browsers: Chrome and Firefox. It will then try and steal information that&#8217;s stored in the user&#8217;s clipboard via Apple&#8217;s own API.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<div class=\"align-center\"><a href=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2023\/08\/newest-xloader-threat-targets-work-environments-1.jpg\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2023\/08\/newest-xloader-threat-targets-work-environments-1.jpg\" alt=\"XLoader malware tool hiding as \" height=\"738\" loading=\"lazy\" class=\"img-responsive article-image\"><\/a>\n<\/div>\n<p><span class=\"carousel-caption\">XLoader malware tool hiding as &#8220;OfficeNote.app.&#8221; Image source: SentinelOne<\/span><\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Apple&#8217;s <a href=\"https:\/\/appleinsider.com\/inside\/safari\" title=\"Safari\" data-kpt=\"1\">Safari<\/a> is not targeted with this variant of XLoader.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Once installed, the malware tool will automatically deposit its payload into the user&#8217;s home directory and execute. It will then create a hidden directory and a barebones app, while a LaunchAgent is then dropped into the user&#8217;s Library.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>This variant of XLoader is specifically designed for work environments, and it is advised IT security teams install third-party services designed to identify malware to prevent installations.\n<\/p>\n<\/div>\n<p><h2 data-anchor=\"how-to-stay-safe\" id=\"how-to-stay-safe\">How to stay safe<\/h2>\n<\/p>\n<div class=\"col-sm-12\">\n<p>As mentioned above, utilizing a software security service that can identify malware tools such as this one are important, especially for businesses. And of course, another easy way to stay safe and avoid malware tools is to avoid downloading any software or apps that you do not recognize.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>macOS is still the safer option when it comes to malware tools like this, but the threats are growing. There are even attacks <a href=\"https:\/\/appleinsider.com\/articles\/21\/02\/22\/apple-has-taken-steps-to-eradicate-mysterious-malware-strain\">out there<\/a> designed for <a href=\"https:\/\/appleinsider.com\/inside\/apple-silicon\" title=\"Apple Silicon\" data-kpt=\"1\">Apple Silicon<\/a>. Stay vigilant, even if you are on a Mac.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Word app icon XLoader is a malware tool that has been around for years, and now it is creeping out of the dark yet again with a focus on work environments. XLoader is one of the more common tools that attackers utilize to try and gain information from infected systems. When XLoader appeared on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":134342,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[],"class_list":["post-134341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-insider"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/134341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=134341"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/134341\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/134342"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=134341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=134341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=134341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}