Malware

Hackers Leveraging Extended Attributes To Evade Detection In macOS Systems

Researchers discovered a novel approach employed by the threat actor to conceal codes using Extended Attributes to avoid detection in macOS devices.

Extended attributes are metadata that can be linked to different file systems’ files and directories. They let users retain more details about a file than just the typical attributes, such as permissions, timestamps, and file size.

The most similar method discovered while investigating malware leveraging extended attributes was in 2020, when Bundlore adware concealed its payload in resource forks and was accessed by the unique path `filename/..namedfork/rsrc`. 

The samples are attributed to APT Lazarus with a medium degree of confidence, according to Group-IB experts. Since they have only seen a small number of samples in the wild, researchers are unable to confirm that there were any victims of this incidence. 

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

Overview Of Execution Flow

The malware that was found was termed “RustyAttr,” and it was developed by Lazarus utilizing the Tauri framework. 

In several file systems, files and directories can be linked to metadata called Extended Attributes (EAs). Although the Finder and Terminal do not display these directly, we can easily extract and view the attributes by using `xattr`. 

Researchers say an extended attribute of custom type “test” has been defined by the threat actor.

Execution Flow of the RustyAttr Malware

Tauri is a framework for creating web-based, lightweight desktop apps. It enables programmers to use Rust for the backend and web frontend (HTML, CSS, and JavaScript) to create applications.

In the extended attributes, the malicious script will be retrieved and executed by the application.

Two categories of decoys were identified by the researchers. The first kind of decoy really retrieves a PDF file from filedn[.]com, a file hosting service. 

The “Investment Decision-Making Questionnaire” contains questions about game project development and funding. The second decoy only shows a dialog box with the words, “This app does not support this version.”

Decoy PDF downloaded and open

When the Tauri application runs, it tries to use a WebView to render an HTML webpage. A random template that was downloaded from the internet was used by the TA.

But researchers saw that another dubious piece of javascript called “preload.js” was loaded on these pages.

preload.js

The ‘invoke’ function in Tauri is an Application Programming Interface (API) that promotes communication between the frontend (JavaScript) and backend (Rust), allowing the frontend to call Rust functions, send arguments, and receive data.

At the time of our analysis, the files are fully undetected on VirusTotal, likely due to the fact that the malicious components are concealed within the attributes”, researchers said.

Recommendation

  • Keep an eye out for requests to download, open, or execute files.
  • Never turn off macOS Gatekeeper or permit apps from unknown developers.
  • You need to be vigilant all the time to keep the company safe.

Analyze Unlimited Phishing & Malware with ANY.RUN For Free - 14 Days Free Trial.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

15 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

2 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

12 hours ago