• Wed. Feb 21st, 2024

Trojan.MAC.RustDoor: The New Malware Targeting MacOS Users with Rust Programming Language


Feb 13, 2024
New ‘malware’ found in MacOS that steals files by pretending to be a Visual Studio update

Researchers from cybersecurity company Bitdefender have identified a new ‘malware’ targeting MacOS users. The backdoor, named Trojan.MAC.RustDoor, is written in Rust, a relatively new programming language that helps cybercriminals evade attack detection and analysis.

This ‘malware’ can be used to steal specific files or file types and then archive and upload them to a command and control center (C&C) so that malicious actors can access them. This campaign has been active since at least November of last year and the ‘malware’ has been running undetected for at least three months.

To distribute itself, the ‘malware’ spoofs an update to Microsoft’s Visual Studio program and uses names like ‘VisualStudioUpdater’, ‘DO_NOT_RUN_ChromeUpdates’, or ‘zshrc2’. Additionally, the ‘malware’ runs on multiple types of processors and can include commands like ‘shell’, ‘cd’, ‘sleep’, ‘upload’, ‘taskkill’, or ‘dialog’ that allow cybercriminals to collect and upload files and obtain information about the infected device.

Despite these findings, Bitdefender has indicated that, for the moment, this ‘malware’ campaign cannot be attributed to any known threat actor. However, they have observed similarities with the ransomware ALPHV/BlackCat which also uses the Rust programming language and “common domains” such as command and control infrastructure servers.

This new malware poses a significant threat to MacOS users as it highlights the importance of staying vigilant and employing strong cybersecurity practices to protect against such attacks.

Leave a Reply