SYMBOLCOMMON_NAMEaka. SYNONYMS
osx.xcsset (Back to overview)

XCSSET


There is no description at this point.

References
2021-07-22Trend MicroMickey Jin, Steven Du
@online{jin:20210722:updated:1a824a7, author = {Mickey Jin and Steven Du}, title = {{Updated XCSSET Malware Targets Telegram, Other Apps}}, date = {2021-07-22}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/g/updated-xcsset-malware-targets-telegram--other-apps.html}, language = {English}, urldate = {2021-07-26} } Updated XCSSET Malware Targets Telegram, Other Apps
XCSSET
2021-05-24Jamf BlogJaron Bradley
@online{bradley:20210524:zeroday:7196ca4, author = {Jaron Bradley}, title = {{Zero-Day TCC bypass discovered in XCSSET malware}}, date = {2021-05-24}, organization = {Jamf Blog}, url = {https://www.jamf.com/blog/zero-day-tcc-bypass-discovered-in-xcsset-malware/}, language = {English}, urldate = {2021-06-11} } Zero-Day TCC bypass discovered in XCSSET malware
XCSSET
2021-04-16Trend MicroSteven Du, Dechao Zhao, Luis Magisa, Ariel Neimond Lazaro
@online{du:20210416:xcsset:9c5ad09, author = {Steven Du and Dechao Zhao and Luis Magisa and Ariel Neimond Lazaro}, title = {{XCSSET Quickly Adapts to macOS 11 and M1-based Macs}}, date = {2021-04-16}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/d/xcsset-quickly-adapts-to-macos-11-and-m1-based-macs.html}, language = {English}, urldate = {2021-04-28} } XCSSET Quickly Adapts to macOS 11 and M1-based Macs
XCSSET
2021-03-12Kaspersky LabsIlya Mogilin
@online{mogilin:20210312:good:b3d6b00, author = {Ilya Mogilin}, title = {{Good old malware for the new Apple Silicon platform}}, date = {2021-03-12}, organization = {Kaspersky Labs}, url = {https://securelist.com/malware-for-the-new-apple-silicon-platform/101137/}, language = {English}, urldate = {2021-03-19} } Good old malware for the new Apple Silicon platform
XCSSET
2021-01-01Objective-SeePatrick Wardle
@online{wardle:20210101:mac:a6f5a3b, author = {Patrick Wardle}, title = {{The Mac Malware of 2020 - a comprehensive analysis of the year's new malware}}, date = {2021-01-01}, organization = {Objective-See}, url = {https://objective-see.com/blog/blog_0x5F.html}, language = {English}, urldate = {2021-01-11} } The Mac Malware of 2020 - a comprehensive analysis of the year's new malware
AppleJeus Dacls EvilQuest FinFisher WatchCat XCSSET
2020-08-13Trend MicroMac Threat Response and Mobile Research Team
@online{team:20200813:xcsset:f962581, author = {Mac Threat Response and Mobile Research Team}, title = {{XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits}}, date = {2020-08-13}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/xcsset-mac-malware-infects-xcode-projects-performs-uxss-attack-on-safari-other-browsers-leverages-zero-day-exploits/}, language = {English}, urldate = {2020-08-19} } XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
XCSSET
2020-08-13Trend MicroMac Threat Response and Mobile Research Team
@techreport{team:20200813:xcsset:8783900, author = {Mac Threat Response and Mobile Research Team}, title = {{The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits (Technical Brief)}}, date = {2020-08-13}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/pdf/XCSSET_Technical_Brief.pdf}, language = {English}, urldate = {2020-08-20} } The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits (Technical Brief)
XCSSET

There is no Yara-Signature yet.