Home » New XCSSET macOS Malware Variant Targets Firefox with Clipper Module

New XCSSET macOS Malware Variant Targets Firefox with Clipper Module

New macOS XCSSET malware variant targets Firefox and cryptocurrency wallets Researchers discovered a new XCSSET macOS malware variant that hijacks crypto wallets and targets Firefox users.

Cybersecurity researchers have uncovered a new variant of XCSSET malware targeting Apple macOS. The updated strain introduces a clipboard hijacker (clipper) to steal cryptocurrency and expands its reach to the Firefox browser, alongside enhanced persistence techniques.

What Is XCSSET Malware?

XCSSET is a modular macOS malware family first identified in 2020. It spreads by infecting Xcode projects and activates when developers build and share applications. Once inside a system, XCSSET exfiltrates data, injects malicious scripts, and maintains long term persistence.

New Capabilities in the Latest Variant

The latest strain brings several dangerous upgrades:

  • Clipboard Hijacker (Clipper): Monitors the clipboard for crypto wallet addresses and swaps them with attacker controlled addresses.

  • Firefox Targeting: Expands data theft to Firefox, using a modified version of HackBrowserData.

  • Persistence Modules: Introduces both LaunchDaemon and Git based persistence to survive reboots.

  • Stealthy AppleScripts: Uses compiled run-only AppleScripts for obfuscation.

How the Infection Works

The infection chain proceeds in multiple stages:

  1. A trojanized Xcode project delivers the malware.

  2. AppleScript applications execute shell commands to fetch final stage payloads.

  3. The malware collects system info, launches modules, and establishes persistence.

  4. Modules handle data theft, including Telegram checks, file exfiltration, and browser data collection.

Why Developers Are at Risk

Because XCSSET spreads through shared Xcode projects, developers can unknowingly spread the malware. Its stealthy persistence means infected systems may continue leaking data for extended periods.

Mitigation Advice

Experts recommend:

  • Update macOS and security tools regularly.

  • Inspect Xcode projects before using shared or downloaded repositories.

  • Verify clipboard data before transferring cryptocurrency.

  • Audit persistence entries like LaunchDaemons for unauthorized additions.

Conclusion

The new XCSSET variant shows how attackers adapt to target macOS developers and cryptocurrency users. By expanding its scope to Firefox and integrating advanced persistence, the malware underscores the urgent need for strong developer hygiene and continuous security monitoring.


FAQs

1. What is XCSSET malware?
XCSSET is modular malware targeting macOS, often spread through infected Xcode projects.

2. What’s new in this variant?
It adds a clipboard hijacker, Firefox targeting, and new persistence modules.

3. How does the clipper work?
It monitors the clipboard for crypto wallet addresses and replaces them with attacker owned addresses.

4. Why is Firefox a target?
Firefox stores sensitive data, such as passwords and browsing activity, making it valuable for attackers.

5. How can developers protect themselves?
Inspect Xcode projects, update systems, monitor persistence entries, and use endpoint detection tools.

Leave a Reply

Your email address will not be published. Required fields are marked *