This new custom macOS malware seizes control of your Google Drive account

Magnifying glass enlarging the word 'malware' in computer machine code
(Image credit: Shutterstock)

Cybersecurity researchers from Volexity have discovered a previously unknown, custom malware designed for macOS that they say is capable of taking control of the target’s Google Drive account.

The malware is most likely developed by Storm Cloud, a Chinese cyber-espionage threat actor that, judging by its complexity, has formidable skills and resources.

After retrieving it from a compromised MacBook Pro running macOS 11.6 (Big Sur), the researchers named the malware GIMMICK. It’s described as a multi-platform malware, written in Objective C, or .NET and Delphi, depending on the operating system it targets.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Apple's fix

Once GIMMICK infects an endpoint, it establishes a session to the Google Drive cloud storage, using hard-coded OAuth2 credentials. Then, it loads three separate malware elements - DriveManager, FileManager, and GCDTimerManager.

These give the attackers the ability to manage Google Drive and proxy sessions, maintain a local map of the Google Drive directory hierarchy in memory, manage locks for syncing tasks on the Drive session, and manage upload and download tasks.

The commands GIMMICK supports, the publication further details, includes transmitting base system information, uploading files to the command and control server (C2), downloading files to the client endpoint, executing a shell command, writing output to C2, and overwriting client work period information.

“Due to the asynchronous nature of the malware operation, command execution requires a staged approach. Though the individual steps occur asynchronously, every command follows the same.” Volexity explained. 

To tackle the malware, Apple pushed out new protections to all supported macOS versions, in the form of new signatures for XProtect and MRT antivirus solutions. All users are advised to head over to Apple’s support page, and follow the instructions found there.

The malware is quite the find, the publication claims. Usually, in cyber-espionage campaigns such as this one, threat actors make sure they leave no traces of their presence, and usually delete any code used. 

Via: BleepingComputer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Image of laptop infected with malware threat
This devious new macOS malware disguises itself as Chrome, Zoom installers
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
This devious macOS malware is evading capture by using Apple's own encryption
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Ransomware
Microsoft spies a new and worrying macOS malware strain
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Mac users targeted with new malware, so be on your guard
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
These fake macOS updates are actually just looking to spread malware
Latest in Security
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedlyleft users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
Latest in News
Stability AI 3D Video
Stability AI’s new virtual camera turns any image into a cool 3D video and I’m blown away by how good it is
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedlyleft users exposed for months
Google Pixel 9a
Google is delaying the Pixel 9a to fix a mystery “component quality issue”
The bottom left corner of an Android phone, showing the Phone, Messages, Google icons and Google Search bar
Google Messages remote delete will soon save you from texting embarrassment – and here's how it works
ExpressVPN mobile app and Aircove
ExpressVPN ‘reduces workforce’ for the second time in two years
The Nanoleaf PC Screen Mirror Lightstrip being used on a desktop computer.
Mac gaming could get an intriguing boost – but not in the way you'd expect