ChillyHell & ZynorRAT: A Comedy of Malware Errors Unfolds in Cybersecurity
Cybersecurity researchers have uncovered two malware families: CHILLYHELL, a macOS backdoor, and ZynorRAT, a Go-based trojan. CHILLYHELL is an adaptable threat, while ZynorRAT uses Telegram for command-and-control. Both show evolving malware sophistication.

Hot Take:
So, we’ve got CHILLYHELL and ZynorRAT trying to outdo each other in the digital mischief world. One’s a macOS backdoor with a timestamp fetish, and the other’s a Telegram-obsessed RAT that can’t decide if it wants to be on Windows or Linux. It’s like a soap opera for malware enthusiasts!
Key Points:
– **CHILLYHELL**: A modular macOS backdoor attributed to a mysterious threat group UNC4487, originally aimed at Ukrainian government websites.
– **ZynorRAT**: A Go-based remote access trojan targeting Windows and Linux, using a Telegram bot for command and control.
– **Persistence Tactics**: CHILLYHELL uses LaunchAgents, shell profile alterations, and timestomping, while ZynorRAT prefers systemd services.
– **Communication Channels**: CHILLYHELL uses HTTP/DNS, and ZynorRAT relies heavily on Telegram for its C2 infrastructure.
– **Development Dynamics**: ZynorRAT seems to be a work in progress, with its Windows version borrowing persistence tricks from Linux.