MacOS Backdoor Is Spying On You

Did you know that the macOS backdoor is spying on you? Users have been the target of recently found macOS malware. It uses the public cloud as its command and control (C2) server to snoop on them.

Thank you for reading this post, don't forget to subscribe!

Researchers from ESET said that the campaign’s objective is to steal as much data as possible from its targets. Documents, emails, and their attachments are included, as file lists from portable storage. Additionally, the spyware has the ability to take screenshots and record keystrokes.

The ESET team identified it as CloudMensis. They said that its relatively small dissemination points to a targeted operation rather than a general assault. The researchers came to the conclusion that macOS users with updated endpoints should be safe because the attackers, whose identities are still unknown, did not employ any zero-day vulnerabilities in their campaign.

 

MacOS backdoor is spying on you: plenty of commands

“We still don’t know who the targets are or how CloudMensis is initially delivered. The writers may not be extremely experienced in Mac development as seen by the generally high caliber of the code and lack of obfuscation. Nevertheless, significant effort was made to make CloudMensis an effective surveillance tool and a threat to possible targets, according to Marc-Etienne Léveillé, an ESET researcher.

The researchers also noted that CloudMensis is a multi-stage strategy. The malware would initially look for administrative rights and the capacity to run code. It would then launch a dropper that would retrieve a second-stage malware that was more powerful from cloud storage.

The second-stage virus comprises 39 commands in all, including ones for screenshot capture and data exfiltration.

The attackers use three separate public cloud service providers—pCloud, Yandex Disk, and Dropbox—to connect with the virus. Beginning in early February 2022, the campaign began.

ESET claims that Apple has acknowledged the existence of malware that targets its customers and is putting Lockdown Mode for iOS, iPad, and macOS together as a mitigating strategy. This program would deactivate functions that threat actors typically use to obtain access to the target endpoint’s code execution capabilities.

Related Posts

Exploring Moonlighting Aesthetics: The Blend of Work and Passion

Moonlighting, in its most fundamental definition, refers to the practice of individuals taking up secondary employment or projects outside their primary job.Thank you for reading this post, don’t forget to…

Faith Victor Onyekwere Joins Hubli by GWC as Co-Founder, Becomes 3rd Largest Shareholder

Abuja, Nigeria – [July 7, 2025]Thank you for reading this post, don’t forget to subscribe! In a strategic move poised to elevate innovation within Nigeria’s digital commerce space, Faith Victor…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Missed

Transform Your Day: How My Morning Routine Made Me Happier

Transform Your Day: How My Morning Routine Made Me Happier

Feed Your Face: The Best Foods for Every Body Part

Feed Your Face: The Best Foods for Every Body Part

AI Travel Planners: Your New Best Friend for Unforgettable Journeys

AI Travel Planners: Your New Best Friend for Unforgettable Journeys

The Rise of AI-Powered Music: Revolutionizing the Soundscape

The Rise of AI-Powered Music: Revolutionizing the Soundscape

The Last-Minute Travel Surge: Embracing Spontaneity in Booking

The Last-Minute Travel Surge: Embracing Spontaneity in Booking

Exploring Moonlighting Aesthetics: The Blend of Work and Passion

Exploring Moonlighting Aesthetics: The Blend of Work and Passion