28 Mar
28Mar


New malware strain targeting macOS systems, dubbed β€œCoffeeLoader.malware strain targeting macOS systems, dubbed β€œCoffeeLoader,” which employs advanced techniques to bypass endpoint security solutions and deliver Rhadamanthys shellcode payloads.
The malware represents a significant evolution in threats targeting Apple’s ecosystem, demonstrating increasing complexity in evasion tactics.

Initial analysis indicates that CoffeeLoader exploits legitimate system processes to maintain persistence and avoid detection by traditional security measures.
The malware primarily spreads through compromised software downloads and phishing emails containing malicious attachments that appear as legitimate PDF documents or application installers.
Once executed, CoffeeLoader establishes a foothold by modifying system files and creating hidden directories to store its components while simultaneously disabling certain security features native to macOS.
Zscaler researchers identified the threat after observing unusual network traffic patterns from infected systems communicating with command-and-control servers primarily hosted in Eastern Europe.
Their analysis revealed that the malware employs a multi-stage infection process designed to evade detection at each phase of execution, making remediation particularly challenging for security teams.
CoffeeLoader’s attack vector relies on exploiting user privileges, initially presenting itself as a benign application requiring installation permissions.
After gaining these privileges, it deploys a series of obfuscated scripts that establish persistence mechanisms across system restarts while remaining invisible to standard security scans.
The impact extends beyond data theft, as infected systems become part of a larger botnet infrastructure capable of launching distributed attacks or mining cryptocurrency using system resources, significantly degrading performance and potentially causing business disruption.


The malware’s infection process begins with a seemingly innocuous executable that leverages a technique called β€œdylib hijacking” to load malicious code into legitimate processes.
This process involves code similar to:-
void inject_payload(void) {    mach_vm_address_t addr;    mach_vm_allocate(task, &addr, payload_size, VM_FLAGS_ANYWHERE);    mach_vm_write(task, addr, (vm_offset_t)payload, payload_size);    thread_act_t thread;    thread_create_running(task, x86_THREAD_STATE64, (thread_state_t)&state, x86_THREAD_STATE64_COUNT, &thread);}

Comments
* The email will not be published on the website.