New 'MetaStealer' malware targets Intel-based macOS systems

Discussion in 'all things Mac' started by Rasheed187, Sep 16, 2023.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    This one is focused on Intel based macOS systems and is able to bypass XProtect. However, if it's run via Rosetta, it could also infect M1/M2 systems.

    https://www.bleepingcomputer.com/ne...er-malware-targets-intel-based-macos-systems/
     
  2. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    2,313
    Location:
    .
    There is no way of knowing quite yet, but late yesterday's unusually timed Apple updates to both XProtect Remediator and XProtect itself may be helping with a solution. Even though Apple never reveals the content of XProtect Remediator/XProtect (111/2171) updates, we may know more in a day or two as the update's content is independently sleuthed out.

    Since the popularity of YARA can be so effective, a careful postmortem MetaStealer analysis may have provided relevant data.

    Blocking the bad actor's C² server's 2 IP addresses and 3 URLs, detailed in SentinelOne's analysis, should also be helpful.
     
    Last edited: Sep 16, 2023
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.