Stay updated with the latest Cybersecurity News on our TecnetBlog.

New Variant of XCSSET Malware on macOS Detected by Microsoft

Written by Zoilijee Quero | Sep 26, 2025 4:00:01 PM

Microsoft Threat Intelligence has sounded the alarm: a new variant of the XCSSET malware has been detected on macOS. Although it has only been seen in limited attacks so far, it arrives equipped with more advanced techniques. Among them are improved browser manipulation, clipboard hijacking, and reinforced persistence mechanisms that allow it to remain active on the system.

XCSSET is not new to the scene. It’s a modular malware that functions as both an information and cryptocurrency thief, capable of stealing notes, digital wallets, and browsing data from infected machines.

Its method of spreading is particularly dangerous: it searches for Xcode projects on the device, contaminates them, and ensures it executes every time the developer builds a project.

In Microsoft’s words: “The XCSSET malware is designed to infect Xcode projects, commonly used by software developers, and run during the build process of an application in this environment.” In short, its ability to spread through shared projects among developers makes it a silent threat with massive potential impact.

 

New XCSSET Variant: Firefox Data Theft and Clipboard Hijacking

 

In this new variant of XCSSET, researchers have identified several changes that make it even more dangerous.

For one, the malware now specifically targets Firefox, using a modified version of HackBrowserData—an open-source tool designed to decrypt and extract stored browser data. Thanks to this modification, attackers can more easily steal sensitive data from Firefox users.

But that’s not all. The update also enhances the clipboard hijacking module. On infected macOS devices, the malware continuously monitors what the user copies and pastes. If it detects something resembling a cryptocurrency address, it automatically replaces it with one controlled by the attackers.

The result? Any cryptocurrency transfer made from a compromised device ends up in the cybercriminals’ wallets instead of reaching the intended recipient.

 

Attacker Cryptocurrency Addresses Used with the Clipboard Hijacker (Source: Microsoft)

 

Read more: New RatOn Trojan on Android Can Empty Your Bank Accounts

 

XCSSET Hides Better: New Persistence Tactics and Protection Tips

 

The malware doesn’t just steal data—it also knows how to stay hidden within the system. The new variant of XCSSET incorporates more sophisticated persistence methods, such as creating LaunchDaemon entries that execute a malicious payload called ~/.root. It even goes so far as to generate a fake System Settings application (Settings.app) in the /tmp folder to disguise its activity and remain unnoticed.

For now, the threat is not widespread. Microsoft confirms it has only been detected in limited attacks, although it has already shared the information with Apple and is working with GitHub to remove infected repositories that help spread the malware.

 

How to Protect Yourself from This New XCSSET Variant

 

To stay protected, the primary recommendation is clear: always keep macOS and all applications up to date. At TecnetOne, we emphasize this point strongly, as XCSSET has previously exploited zero-day vulnerabilities—making it particularly dangerous when systems are not fully patched.

Additionally, Microsoft advises developers to thoroughly inspect Xcode projects before compiling them, especially when they come from third parties or have been shared in repositories. This remains one of the main channels through which the malware infiltrates development environments.