A new iteration of the XLoader macOS malware has emerged, disguising itself as an office productivity app named “OfficeNote.” Security researchers at SentinelOne have identified this variant, noting that it is packaged within an Apple disk image with the name “OfficeNote.dmg” and is signed with the developer signature “MAIT JAKHU (54YDV8NU9C).”
XLoader, originally detected in 2020, is classified as an information stealer and keylogger, operating as a malware-as-a-service (MaaS) model. Unlike previous versions that utilized Java, this variant adopts programming languages such as C and Objective C to bypass limitations imposed by Java Runtime Environment requirements.
The latest iteration of XLoader was detected by SentinelOne researchers through multiple submissions on VirusTotal in July 2023, indicating widespread distribution and use. The malware is marketed on crimeware forums, with the Mac version available for rental at a relatively high price of $199/month or $299/3 months, compared to the lower costs of its Windows counterparts.
Once executed, the malicious OfficeNote app installs a Launch Agent in the background, allowing it to persist on the system. XLoader is designed to gather sensitive data from macOS users, including clipboard contents and information stored in directories associated with web browsers like Google Chrome and Mozilla Firefox.
Despite its various evasive techniques, XLoader presents an ongoing threat to macOS users and businesses, targeting individuals in working environments. This iteration, posing as an office productivity application, seeks to compromise browser and clipboard data, potentially for sale or use by other threat actors.
The researchers emphasize the need for continued vigilance and security measures to mitigate the risks associated with this malware.