• CONTACT
  • MARKETCAP
  • BLOG
Coin Mela Coin Mela
  • Home
  • News
    • All News
    • Bitcoin
    • Ethereum
    • XRP
    • Altcoins
    • NFT
    • Blockchain
    • Web3
    • DeFi
    • Finance
    • Stocks
    • Company
  • Learn
  • Market
  • Advertise
Reading: XCSSET Malware Resurfaces with Enhanced Techniques Targeting Apple Users and Cryptocurrency Transactions
Share
  • kpk ETH Primekpk ETH Prime(KPK ETH PRIME)$2,034.90
  • bitcoinBitcoin(BTC)$70,328.00
  • ethereumEthereum(ETH)$2,058.94
  • kpk ETH Yieldkpk ETH Yield(KPK ETH YIELD)$2,030.62
  • tetherTether(USDT)$1.00
  • binancecoinBNB(BNB)$651.90
  • rippleXRP(XRP)$1.39
  • usd-coinUSDC(USDC)$1.00
  • solanaSolana(SOL)$86.75
  • tronTRON(TRX)$0.289103
CoinMelaCoinMela
Font ResizerAa
  • Home
  • News
  • Learn
  • Market
  • Advertise
Search
  • Home
  • News
    • All News
    • Bitcoin
    • Ethereum
    • XRP
    • Altcoins
    • NFT
    • Blockchain
    • Web3
    • DeFi
    • Finance
    • Stocks
    • Company
  • Learn
  • Market
  • Advertise
Have an existing account? Sign In
Follow US
© Coin Mela Network. All Rights Reserved.
News

XCSSET Malware Resurfaces with Enhanced Techniques Targeting Apple Users and Cryptocurrency Transactions

News Desk
Last updated: September 26, 2025 2:39 pm
News Desk
Published: September 26, 2025
Share
XCCSET macOS Malware.webp

Microsoft researchers have reported that the notorious XCSSET malware has re-emerged, showcasing an improved set of capabilities aimed at stealing sensitive data, ensuring persistent access to infected devices, and hijacking cryptocurrency transactions. This evolved version serves as a stark reminder of how cybercriminals continuously adapt and enhance malware that has already been a significant menace to Apple’s ecosystem for several years.

### Four-Stage Infection Chain with a Twist

The updated XCSSET maintains its established four-stage infection process but incorporates new modules in its final stage. A significant highlight is its expanded targeting capability that now includes Firefox users alongside its previous focus on Chrome. Attackers have developed a custom information-stealing module that extracts passwords, cookies, browsing history, and stored credit card information from Mozilla’s browser.

This extension broadens the potential victim demographic. While Google Chrome holds the majority market share, Firefox still boasts tens of millions of users, many of whom are developers or security-conscious individuals who may not anticipate being targeted by malware in their chosen browser.

The malware has also enhanced its persistence mechanisms. A novel LaunchDaemon-based approach embeds a hidden file in user directories, camouflaging itself as a benign “System Settings” application. Additionally, it disables essential macOS software updates and Apple’s Rapid Security Response patches, prolonging the vulnerability of infected systems.

### Targeting Cryptocurrency Users

A particularly damaging upgrade affects cryptocurrency users. The malware now has the capability to monitor clipboard activity for wallet addresses. If it detects a victim copying an address, it can quietly replace it with the attacker’s own address, redirecting funds during transactions. While clipboard hijacking isn’t a new tactic in the malware landscape, its incorporation into a macOS-focused campaign underscores the threats facing casual crypto users that rely heavily on copy-paste actions for their transactions.

### Persistence through Social Engineering

XCSSET’s initial delivery method remains unchanged — the malware is still primarily spread through compromised Xcode projects. Developers who download or clone malicious repositories unknowingly execute code that initiates the first stage of the infection. This distribution strategy is particularly insidious, as developers frequently share projects, allowing the infected code to proliferate inconspicuously through Git repositories. This approach complicates traditional defense mechanisms by blurring the lines between legitimate and malicious software.

The second stage focuses on persistence. The malware alters local project settings and environment variables to ensure that the infection endures through project reloads and potentially spreads if the tainted project is shared with others. At this juncture, a victim might not perceive any anomalies, as the developer workflow appears to continue normally.

The third stage involves escalation and reconnaissance. Here, the malware downloads additional scripts that assess the system for valuable information, such as the operating system version, hardware specifications, active processes, and browsing profiles. It also establishes connections to the command-and-control (C2) server, indicating that the infected machine is ready for subsequent, targeted payloads.

Only after the completion of these three stages does the fourth stage deploy more sophisticated modules — an area where Microsoft notes significant evolution has occurred.

### A Continuously Evolving Threat

Patrick Wardle, founder of the Objective-See Foundation and author of “The Art of Mac Malware” book series, has labeled XCSSET as one of the most treacherous pieces of malware targeting Apple operating systems. Describing it as “insidious,” he emphasizes the persistent threat it poses.

Originally documented in 2020, XCSSET has consistently resurfaced, equipped with modifications that enable it to evade detection and expand its reach. The new variant intensifies its use of obfuscation, modular design, and reliance on AppleScript for executing commands. These alterations complicate analysis and provide attackers with the ability to swiftly update or substitute modules as necessary.

According to Microsoft’s Threat Intelligence team, the malware’s architecture allows it to react quickly to defensive measures. Each new module represents an additional layer of capabilities that attackers can deploy on demand, ensuring the ongoing evolution of the threat landscape linked to XCSSET.

IRS Announces Changes to Federal Income Tax Brackets for 2026, Potentially Increasing Paychecks
Josh Brolin’s Journey from Financial Struggles to Day Trading Success and Major Film Projects
Stocks sink as Microsoft weighs on market, Apple earnings on deck
Morgan Stanley to Launch Crypto Trading on E*Trade Platform in 2026
Ark Invest invests over $56 million in Google shares amid ongoing tech and crypto acquisitions
Share This Article
Facebook Whatsapp Whatsapp
ByNews Desk
Follow:
CoinMela News Desk brings you the latest updates, insights, and in-depth coverage from the world of cryptocurrencies, blockchain, and digital finance.
Previous Article e9e2de07cd434c168d51192a2d8e8ac9 Ethereum Recovers to $4,037 Despite Recent Declines and Liquidations
Next Article 1758897740 image1 Bitget to Launch Universal Exchange Framework at TOKEN2049 Singapore
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News
0c96c5a0 1d9b 11f1 bf3f dd8f1369fbd7
US Stock Futures Slide as Oil Prices Surge Amid Escalating Iran Conflict
2026 03 09T071945Z 8749907 RC2R0KAIGFRM RTRMADP 3 IRAN CRISIS ENERGY PHILIPPINES 1773297088 310258 1
Southeast Asia Braces for Energy Shortages Amid Closure of Strait of Hormuz
1771709140 625e962319ce6313fb691ba6193954b6dfcccf67 1920x1080
Binance Derivatives Market Surges, Signaling Increased Volatility in Crypto Trading
- Advertisement -
Ad image

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
Coin Mela Coin Mela
CoinMela is your one-stop destination for everything Crypto, Web3, and DeFi news.
  • About Us
  • Contact Us
  • Corrections
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Advertise with Us
  • Quick Links
  • Finance
  • Company
  • News
  • Stocks
  • Bitcoin
  • XRP
  • Ethereum
  • Altcoins
  • Blockchain
  • DeFi
© Coin Mela Network. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?