New 'Cuckoo' Persistent macOS Spyware Targeting Intel and Arm Macs

Summary:
The discovery of Cuckoo highlights the ongoing arms race between cybersecurity researchers and malicious actors. This malware's sophistication, from its ability to evade detection to its multifaceted information-gathering capabilities, showcases the level of expertise adversaries have attained in crafting highly effective threats. One crucial aspect of Cuckoo's functionality is its careful selection of target countries. By checking the compromised system's locale and avoiding execution in specific regions like Armenia, Belarus, Kazakhstan, Russia, and Ukraine, the malware aims to evade scrutiny from certain jurisdictions or law enforcement agencies. This geopolitical awareness adds another layer of complexity to its operations.

Security Officer Comments:
Moreover, the use of signed application bundles with valid developer IDs adds legitimacy to the malicious software, potentially deceiving users and systems. The tactic underscores the importance of not relying solely on digital signatures or developer credentials as indicators of trustworthiness, as threat actors can exploit and forge these credentials, as well.

Suggested Corrections:
IOCs:
https://blog.kandji.io/malware-cuckoo-infostealer-spyware

To avoid unintentionally installing Spyware, follow these good security practices:
  • Don't click on links within pop-up windows - Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the "X" icon in the titlebar instead of a "close" link within the window.
  • Choose "no" when asked unexpected questions - Be wary of unexpected dialog boxes asking whether you want to run a particular program or perform another type of task. Always select "no" or "cancel," or close the dialog box by clicking the "X" icon in the titlebar.
  • Be wary of free downloadable software - There are many sites that offer customized toolbars or other features that appeal to users. Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs.
  • Don't follow email links claiming to offer anti-spyware software - Like email viruses, the links may serve the opposite purpose and actually install the spyware it claims to be eliminating.
Link(s):
https://thehackernews.com/2024/05/new-cuckoo-persistent-macos-spyware.html