When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
It includes a code editor, debugger, Interface Builder, and tools for testing and deploying apps.
Limited attacks
In essence, XCSSET is an infostealer.
Image credit: Shutterstock
For persistence, XCSSET now uses two techniques, called zshrc and dock.
In the first one, the malware creates a file named ~/.zshrc_aliases, which contains the payload.
It then creates a fake Launchpad app and replaces the legitimate ones entry in the doc.
They should also only install apps from trusted sources, such as a software platforms official app store.