When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

It includes a code editor, debugger, Interface Builder, and tools for testing and deploying apps.

Limited attacks

In essence, XCSSET is an infostealer.

Ransomware

Image credit: Shutterstock

For persistence, XCSSET now uses two techniques, called zshrc and dock.

In the first one, the malware creates a file named ~/.zshrc_aliases, which contains the payload.

It then creates a fake Launchpad app and replaces the legitimate ones entry in the doc.

They should also only install apps from trusted sources, such as a software platforms official app store.