The publications are suspended, except for particular events, from 1 to 21 August. In the meantime, we are preparing some news for the second half of the year.
CloudMensis targets macOS users. ESET cybersecurity experts: The malware, a backdoor, exclusively uses public cloud storage services to communicate back and forth with its operators
CloudMensis is a new malware targeting macOS users. This have been detected by ESET cybersecurity experts, who discovered the backdoor that spies on users of the compromised Mac and exclusively uses public cloud storage services to communicate back and forth with its operators. Its capabilities clearly show that the intent of its operators is to gather information from the victims’ PCs by exfiltrating documents, keystrokes, and screen captures. Apple has recently acknowledged the presence of spyware targeting users of its products and is previewing Lockdown Mode on iOS, iPadOS and macOS, which disables features frequently exploited to gain code execution and deploy malware. CloudMensis is developed in Objective-C. When code execution and administrative privileges are gained, what follows is a two-stage process, where the first one downloads and executes the more featureful second one. Interestingly, this first-stage malware retrieves its next stage from a cloud storage provider. It doesn’t use a publicly accessible link; it includes an access token to download the MyExecute file from the drive.