The Lazarus Group has been leveraging the macOS xattr command to embed malicious payloads within file metadata, bypassing traditional detection methods and evading security measures. Extended attributes (xattr) allow the storage of additional data, such as binary information or tags, alongside files. While this feature is useful for system metadata, attackers are exploiting it to conceal malicious code within system files, making it difficult for security tools to detect and remove. The group's tactics, known as RustyAttr, involve embedding hidden data in system files using the xattr command. This allows attackers to maintain persistence on compromised systems by hiding malicious payloads in extended file attributes, bypassing conventional security measures. For example, the Lazarus Group may embed a custom attribute (e.g., com.example.hidden_data) within a file to conceal malicious content. In one observed attack, a suspicious zip file containing a .docx and .app file was downloaded. The attacker used xattr -r to recursively scan the .app file for hidden attributes, revealing a malicious script stored within the custom attribute “test.” This script fetched a second-stage payload from a remote server, enabling further compromise. The group's use of xattr and a revoked code-signing certificate enables them to mask the malicious code as legitimate applications, making detection challenging. This technique is not currently recognized by the MITRE ATT&CK framework, leaving systems vulnerable to these stealthy attacks.
Excessive CPU and memory usage in Google Chrome has become a common issue, often caused by malicious or poorly designed browser extensions. Some extensions are built with hidden mo...
Cybersecurity researchers have identified a new variant of the GlassWorm campaign that targets developers through a malicious Open VSX extension named “specstudio.code-wakatime-a...
A recently disclosed flaw in the widely used Android library EngageSDK has created significant concern within the cryptocurrency space, as it may have exposed millions of users to ...