Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

US midterm election mirrors 2024 as crypto pacs move into Ohio races

April 17, 2026

NetX and OpenGPU Forge Strategic Alliance to Standardize Governance in the Decentralized AI Agent Economy

April 17, 2026

Will PENDLE break the $1.38 resistance? Rebound confirmed ONLY IF…

April 17, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Lazarus Group Uses Extended Attributes for Code Smuggling in macOS
Lazarus Group Uses Extended Attributes for Code Smuggling in macOS
Security and Privacy

Lazarus Group Uses Extended Attributes for Code Smuggling in macOS

November 13, 2024No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A new technique by the Lazarus Advanced Persistent Threat (APT) group has been used by the threat actor to smuggle malicious code onto macOS systems, using custom extended attributes. 

This innovative method, observed by Group-IB, bypasses traditional security measures, enabling malicious code to remain concealed and undetected.

Extended attributes, often used to store additional file metadata, are now being leveraged by Lazarus to hide and execute malware on targeted systems.

Evolution of Malware Concealment

The group’s recent malware samples suggest they are experimenting with extended attributes to avoid detection, much like a previous technique used in 2020, where Bundlore adware concealed its payload in resource forks. However, Lazarus’s new approach takes advantage of extended attributes, which are more versatile in modern macOS systems.

Among the Lazarus-developed malware discovered was “RustyAttr,” a Trojan crafted using the Tauri framework. Tauri allows developers to build applications that blend a web frontend with a Rust backend, which has the potential to run stealthily on macOS.

By hiding malicious code within extended attributes and then executing it using Tauri’s built-in interface commands, Lazarus circumvents many antivirus protections. Notably, this malware remains fully undetected on VirusTotal.

Read more on macOS malware: Cthulhu Stealer Malware Targets macOS With Deceptive Tactics

Deceptive Tactics and User Distraction

The research also found that Lazarus’s malware includes various decoy elements, such as PDFs related to project development or cryptocurrency, and fake system messages.

The decoys are intended to mislead users while the malware executes in the background, fetching additional malicious scripts from command-and-control (C2) servers associated with Lazarus since 2024. Some files even referenced previous Lazarus campaigns, like the RustBucket malware from 2023.

See also  Rug Pull Schemes: Crypto Investor Losses Near $1M

Key findings from Group-IB’s analysis include:

  • Code smuggling using extended attributes, a technique not yet cataloged in the MITRE ATT&CK framework

  • The discovery of RustyAttr, a macOS trojan built with the Tauri framework

  • The use of fake decoys and dialogs to distract users while malicious scripts are executed

  • A moderate confidence level in attributing this activity to Lazarus, as no direct victims were identified

At present, Apple’s Gatekeeper prevents unsigned or unnotarized applications from running. However, if victims override these protections, they could unwittingly enable Lazarus’s malware to deploy. 

Cybersecurity experts urged users to stay cautious when prompted to download files from unfamiliar sources and to keep Gatekeeper protections enabled, as disabling these may leave macOS systems vulnerable to such attacks.

Image credit: DenPhotos / Shutterstock.com

Source link

Attributes code Extended Group Lazarus macOS Smuggling
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026

ESCO Announces Agreement to Acquire Megger Group Limited

April 15, 2026

Constellation Software’s Vela Operating Group Enters into Agreement to acquire a majority interest in Derbysoft Holdings Limited

April 15, 2026

Broadcom Announces Extended Partnership with Meta to Deploy Technology to Support Multi-Gigawatts of Meta’s Custom Silicon, MTIA

April 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

SEC delays Fidelity’s Ethereum spot ETF, but decisions are still expected in May

January 19, 2024

Serious Allegations Surround Trump’s World Liberty Financial Project

April 14, 2026

Tornado Cash Developer Says Court Has Derailed Appeal Efforts After Prolonging His Pre-Trial Detention

November 25, 2024

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

US midterm election mirrors 2024 as crypto pacs move into Ohio races

April 17, 2026

NetX and OpenGPU Forge Strategic Alliance to Standardize Governance in the Decentralized AI Agent Economy

April 17, 2026

Will PENDLE break the $1.38 resistance? Rebound confirmed ONLY IF…

April 17, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$74,933.00-0.08%
  • ethereumEthereum(ETH)$2,331.32-1.02%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.431.63%
  • binancecoinBNB(BNB)$628.870.62%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$88.013.01%
  • tronTRON(TRX)$0.3260260.03%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.030.49%
  • dogecoinDogecoin(DOGE)$0.0975280.94%