Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New FlexibleFerret Malware Chain Targets macOS With Go Backdoor
News

New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

Team-CWDBy Team-CWDNovember 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new macOS malware chain that uses staged scripts, credential-harvesting decoys and a persistent Go-based backdoor has been observed to bypass user safeguards, disguise its activity and maintain long-term access to compromised systems.

According to a new advisory from Jamf Threat Labs, the campaign includes a second-stage shell script that reconstructs a download path and fetches different payloads based on whether a system runs on arm64 or Intel chips.

The cybersecurity researchers noted the script retrieved an archive containing the next-stage loader, unpacked it into a temporary directory, then launched the component in the background.

It also established persistence by writing a LaunchAgent that forced the loader to run at login. Jamf said the script then opened a decoy application that imitated Chrome permission prompts and ultimately displayed a Chrome-style password window designed to steal credentials.

Read more on macOS malware threats: macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Security

The decoy routed stolen passwords to a Dropbox account. To avoid detection, the malware assembled the Dropbox host from small string fragments, then used the legitimate Dropbox upload API for exfiltration. It also queried api.ipify.org to capture the victim’s public IP address.

The Role of the Go-Based Backdoor

Once the third stage began, the loader script invoked a malicious Golang project named CDrivers. This backdoor generated a short machine identifier, checked for duplicates, then connected to a hard-coded command server. From there, it entered a persistent command loop that handled tasks such as:

  • Collecting system information

  • Uploading or downloading files

  • Executing shell commands

  • Extracting Chrome profile data

  • Triggering automated credential theft

If an error occurred, the malware fell back to a system-information command and paused for five minutes before resuming activity, preventing single failures from stopping the operation.

Jamf attributed the campaign to FlexibleFerret operators, who continue to refine lures designed to convince targets to run scripts manually.

“Organizations should treat unsolicited ‘interview’ assessments and Terminal-based ‘fix’ instructions as high-risk, and ensure users know to stop and report these prompts rather than follow them,” the researchers concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
Next Article Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

How chatbots can help spread scams

October 14, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.