Connect with us

Mobile Tech

Uncovering the New Phoenix Worm: A Deep Dive into ShadeStager macOS Malware

Published

on

A Mac Studio and Studio Display on a modern desk showing a large bug and virus infection warnings on the screen.

Mosyle, a leading Apple device management and security firm, recently uncovered two new macOS threats that are able to evade detection by antivirus software. These threats, known as Phoenix Worm and ShadeStager, highlight the increasing sophistication of Mac malware and the growing appeal of the Mac platform to cybercriminals.

The evolution of Mac malware has seen a shift towards trojans and infostealers as the preferred methods of attack. Hackers are now more interested in quietly collecting personal and financial information over an extended period, rather than seeking quick gains.

Phoenix Worm: The Stager

Phoenix Worm is a Golang-based malware that serves as a lightweight initial payload, known as a stager. Its main functions include establishing communication with a remote server, generating unique identifiers for infected systems, transmitting system data to malicious actors, and enabling remote upgrades and additional payload execution.

Mosyle’s research indicates that Phoenix Worm is likely part of a larger toolkit designed to facilitate more advanced attacks further down the chain. At the time of investigation, antivirus engines on macOS and Linux platforms were unable to detect the worm, although some success was seen on Windows platforms.

ShadeStager: The Credential Thief

ShadeStager is a modular macOS implant specifically created for credential theft. While it shares similarities with Phoenix Worm, ShadeStager is designed to target developer environments and cloud infrastructure. It seeks to extract SSH keys, cloud credentials, Kubernetes configuration files, authentication data, and browser profiles.

Additionally, ShadeStager collects user and privilege information, OS and hardware details, environment variables, network configuration, and more, all transmitted securely over HTTPS. This allows the malware to execute commands, exfiltrate data, and download files without arousing suspicion.

See also  iPhone iOS 26 Developer Beta 1: Get Your Hands on the Latest Features Now

For Mac administrators looking to enhance their security measures, Mosyle has provided SHA256 hashes for both ShadeStager and Phoenix Worm:

  • ShadeStager: 7e8003bee92832b695feb7ae86967e13a859bdac4638fa76586b9202df3d0156
  • Phoenix Worm: 54ef0c8d7e167053b711853057e3680d94a2130e922cf3c717adf7974888cad2

Mosyle’s researchers noted that they were able to view parts of the malware’s code without extensive reverse engineering, suggesting that the malware was still in development at the time of discovery and may continue to evolve in the future.

Trending