Cyber Security News

New MacOS Malware Let Attackers Control The Device Remotely

A remote access trojan (RAT), HZ RAT, that has been attacking Windows-based devices since at least 2020, was recently upgraded and changed to target Mac users as well. 

Typically, a RAT is a type of malware that an attacker employs to take remote control of a target computer and obtain full administrator capabilities. 

RATs are frequently delivered to their target as an email attachment through phishing emails, or they are downloaded together with applications that appear to be legitimate user requests, like video games. 

On September 5, Intego stated that a new version of HZ RAT, designed to attack macOS environments, had been released in the wild.

Meet the CISOs, Join the Virtual Panel to Learn compliance – Join Free

According to prior reports on HZ RAT, China is the origin host of malware, even though Intego does not disclose attribution information. 

HZ RAT, a recent addition to the Mac malware family, is a tool that grants an attacker complete remote administration access. This RAT first surfaced on Windows PCs in 2022, and it has now made its way to the Mac.

Behavior Of The macOS Malware HZ RAT

As stated in the Moonlock report, HZ RAT can spy on users and steal data, but it’s not a legitimate stealer because of its ingenuity and persistence. As a remote access trojan, the malware grants the attacker full remote administrator capabilities. 

“The malware can take screenshots, record what a user types, steal data from Google Password Manager, and go after user data to breach their WeChat and DingTalk — both of which are popular Mac apps in China”, reads the report.

After installation of the malware, it establishes a connection with a command-and-control server to obtain more instructions. 

This implies that the attacker has the ability to upload and extract files to their server, write arbitrary files to the system, and execute PowerShell scripts and commands from remote locations. 

It’s believed that watering hole-style attacks, fraudulent malicious Google Ads, and website impersonation could be used to spread the new Mac malware.

From a compromised Mac, the malware can collect the following information: 

  • Local IP address
  • Bluetooth devices data
  • Wi-Fi networks and wireless network adapters data
  • Information about the network the device is connected to
  • Hardware specs
  • Data storage info
  • List of apps in the breached device
  • Information from WeChat
  • User and organization data from DingTalk
  • Username and websites from Google Password Manager

While the malware does not harvest passwords from Google Password Manager, it is suspected that actors are leveraging stolen password leaks obtained on the dark web to combine with the username and other data extracted by the malware.  

The true purpose of this initiative is unknown, other than data collection. Even more concerning is that security providers have not been able to detect this ransomware.

Low detection level among security vendors (Moonlock)

Furthermore, Intego discovered a malware sample that mimicked the OpenVPN Connect VPN app. The analysis of the secure List reveals that this malware is posing as OpenVPN Connect

A 2022 examination of the Windows version of this malware also discovered multiple Chinese IP addresses and domains associated with this malware operation.

IPs linked to this campaign (Source: Moonlock)

About 80% of the IPs on the list were discovered to be active but unreachable, with the remaining 20% being inactive.

Recommendation

To safeguard your Mac against these and other risks, download software only from reliable sources, such as the Apple App Store. Update your operating system and security software, and be vigilant of suspicious communications, links, or attachments.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed "PupkinStealer" has been identified by cybersecurity researchers, targeting sensitive user…

8 hours ago

Malware Defense 101 – Identifying and Removing Modern Threats

The cybersecurity landscape in 2025 is defined by increasingly sophisticated malware threats, with attackers leveraging…

17 hours ago

AI Security Frameworks – Ensuring Trust in Machine Learning

As artificial intelligence transforms industries and enhances human capabilities, the need for strong AI security…

18 hours ago

Preventing Phishing Attacks on Cryptocurrency Exchanges

Cryptocurrency exchanges are intensifying security measures in 2025 to focus on preventing phishing attacks, as…

20 hours ago

Adversarial Machine Learning – Securing AI Models

As AI systems using adversarial machine learning integrate into critical infrastructure, healthcare, and autonomous technologies,…

23 hours ago

10 Best NGINX Monitoring Tools – 2025

NGINX monitoring tools ensure NGINX web servers' optimal performance and reliability. These tools provide comprehensive…

23 hours ago