A group of cybersecurity researchers from the company Bitdefender have identified a new form of malware targeting MacOS users. This backdoor masquerades as a Microsoft Visual Studio Code program update but is actually used to steal files from users’ computers. The backdoor, named Trojan.MAC.RustDoor, is written in Rust, a relatively new programming language that helps cybercriminals evade detection and analysis.
This malware can be used to steal specific files or file types and then archive and upload them to a command and control center (C&C) so that malicious actors can access them. The campaign has been active since at least November of last year, with the malware running undetected for at least three months.
To distribute itself, the malware spoofs an update to Microsoft’s Visual Studio program and uses names like ‘VisualStudioUpdater,’ ‘DO_NOT_RUN_ChromeUpdates,’ or ‘zshrc2.’ Additionally, the malware runs on multiple types of processors and can include commands like ‘shell,’ ‘cd,’ ‘sleep,’ ‘upload,’ ‘taskkill,’ or ‘dialog’ that allow cybercriminals to collect and upload files and obtain information about the infected device.
Despite these findings, Bitdefender has indicated that for the moment, this malware campaign cannot be attributed to any known threat actor. However, they have observed similarities with the ransomware ALPHV/BlackCat which also uses the Rust programming language and “common domains” such as command and control infrastructure servers.
This new malware poses a significant threat to MacOS users and underscores the importance of staying vigilant and employing strong cybersecurity practices to protect against such attacks.