A new version of macOS malware, known as UpdateAgent has been found in nature. This indicates that its creators are still trying to improve its functionality.
“Perhaps one of the most identifiable features of the malware is that it relies on the AWS infrastructure to host its various payloads and perform its infection status updates to the server,” researchers from Jamf Threat Labs said in a report.
UpdateAgent, first detected in late 2020, has since evolved into a malware dropper, facilitating the distribution of second-stage payloads such as adware while also bypassing macOS Gatekeeper protections.
The newly discovered Swift-based dropper masquerades as Mach-O binaries named “PDFCreator” and “ActiveDirectory” that, upon execution, establish a connection to a remote server and retrieve a bash script to be executed.
” The primary difference [between the two executables] in that it reaches out at a URL different from where it should load the bash script, researchers said.
“The continued development of this malware shows that its authors continue to remain active, trying to reach as many users as possible,” the researchers said.