“ReaderUpdate” macOS Malware Expands Toolkit with Nim and Rust Versions

The macOS malware loader platform known as “ReaderUpdate” has significantly expanded its capabilities, introducing new variants written in Nim and Rust programming languages.

This development, observed in the latter half of 2024, marks a notable evolution in the malware’s tactics since its initial discovery in 2020.

Originally distributed as a compiled Python binary, ReaderUpdate has now diversified its codebase to include versions written in Crystal, Nim, Rust, and Go.

This multi-language approach demonstrates the malware authors’ adaptability and their efforts to evade detection by security software.

Technical Breakdown of New Variants

The newly identified Nim and Rust variants of ReaderUpdate share core functionalities with their predecessors.

These malware samples typically install themselves in the user’s ~/Library/Application Support/ folder, creating a subfolder with a matching name.

A corresponding persistence agent is then dropped in the user’s LaunchAgents folder to ensure the malware runs at system startup.

ReaderUpdate persistence agent

One of the key features of ReaderUpdate is its ability to reach out to command and control (C2) servers and execute received commands.

According to the Report, , this functionality allows the malware operators to potentially deliver more malicious payloads or offer their infrastructure as a Malware-as-a-Service (MaaS) platform.

macOS Malware
Function names are randomized to hinder analysis

Implications for macOS Security

The emergence of these new variants highlights the ongoing challenge of securing macOS systems against evolving threats.

ReaderUpdate’s ability to remain largely undetected since 2020, coupled with its recent expansion, underscores the importance of robust endpoint protection and continuous threat monitoring.

Security researchers have noted that while ReaderUpdate infections have primarily been associated with adware delivery to date, the loader’s capabilities could potentially be leveraged for more severe attacks.

This possibility emphasizes the need for macOS users and administrators to remain vigilant and maintain up-to-date security measures.

As the ReaderUpdate campaign continues to evolve, cybersecurity professionals are advised to stay informed about new indicators of compromise and to implement appropriate defensive strategies.

The malware’s multi-language approach serves as a reminder of the increasingly sophisticated tactics employed by threat actors targeting macOS systems.

Find this Story Interesting! Follow us on LinkedIn, and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here