Mosyle Uncovers Two New macOS Threats That Bypass Antivirus Software

Mosyle Uncovers Two New macOS Threats That Bypass Antivirus Software

3 Min Read

**Evolving macOS Threats: Phoenix Worm and ShadeStager**

Following the disclosure of the ModStealer malware last September, Mosyle, a leading provider in Apple device management and security, has uncovered two new macOS threats: Phoenix Worm and ShadeStager. These threats underscore the growing sophistication of malware aimed at Mac systems.

### Phoenix Worm: A Subtle Stager

Phoenix Worm is a Golang-based, multi-platform malware crafted to function as a stager. Stagers are lightweight initial payloads that create persistence and set the stage for subsequent attacks. This strategy enables attackers to establish a foothold before launching more comprehensive payloads.

**Key features of Phoenix Worm include:**
– Initiating communication with a remote command-and-control (C2) server
– Creating unique identifiers for compromised systems
– Sending system data back to attackers
– Allowing remote upgrades and additional payload execution

Phoenix Worm appears to be part of a larger toolkit, designed to enable more sophisticated payloads later in the attack sequence. At the time of its discovery, it went undetected by prominent antivirus solutions on macOS and Linux, with only minimal detection observed on Windows.

### ShadeStager: Designed for Credential Theft

ShadeStager is focused on developer environments and cloud infrastructure, specifically targeting:
– SSH keys and known hosts
– Cloud credentials from AWS, Azure, and GCP
– Kubernetes configuration files
– Git and Docker authentication credentials
– Complete browser profiles across major browsers

This malware performs thorough reconnaissance on the host, collecting user and privilege information, OS and hardware specifications, network settings, and environment variables associated with cloud and SSH sessions. Data is exfiltrated via HTTPS, and it has capabilities for command execution and file retrieval.

Significantly, ShadeStager does not include a hardcoded C2 address, and portions of its code were accessible to researchers without reverse engineering, suggesting it may still be in development.

### Conclusion

Both Phoenix Worm and ShadeStager represent the changing landscape of Mac malware, concentrating on stealth and persistence over overt attacks. They illustrate a trend toward modular malware that distinguishes initial access from post-exploitation tasks, making detection more challenging.

As malware evolves in sophistication, traditional signature-based antivirus solutions fall short. Organizations need to embrace behavioral detection and real-time visibility as essential elements of their security frameworks.

### Indicators of Compromise

For Mac administrators, Mosyle has shared the following SHA256 hashes for these threats:
– **ShadeStager:** 7e8003bee92832b695feb7ae86967e13a859bdac4638fa76586b9202df3d0156
– **Phoenix Worm:** 54ef0c8d7e167053b711853057e3680d94a2130e922cf3c717adf7974888cad2

These findings highlight the necessity for improved security measures in macOS environments to address the increasing wave of sophisticated malware.

You might also like