Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
New XCSSET Malware Variant: The Mac Menace No One Asked For
Beware of sneaky XCSSET macOS malware! The new variant is targeting digital wallets and Notes app data, with clever code obfuscation and pesky persistence techniques. Distributed via infected Xcode projects, it’s been around for years, evolving like a fine wine—if wines could steal your personal information, that is.

Hot Take:
Ah, XCSSET, the retro malware that just won’t quit. Like a persistent houseplant that refuses to wilt, it’s back with a new variant targeting macOS users. This time, it’s not just looking for a cozy spot in your hard drive, it’s got its eyes on your digital wallet and Notes app. If only it could stay out of our personal lives like an annoying ex! Microsoft is playing detective here, unraveling XCSSET’s latest tricks, which seem to be straight out of a cyber-thriller. With new obfuscation techniques and a penchant for sneaking into Xcode projects, this malware is like the James Bond of the cyber underworld, minus the charm and good looks. Anyway, Apple users, brace yourselves and maybe reconsider that five-year-old Xcode project you’ve been clinging to like a beloved family recipe.
Key Points:
- XCSSET macOS malware has resurfaced with a new variant, targeting digital wallets and the Notes app.
- The malware is distributed through infected Xcode projects and showcases improved obfuscation and persistence techniques.
- Microsoft’s Threat Intelligence team identified the new variant, noting enhanced code obfuscation and new infection strategies.
- XCSSET employs two persistence techniques: zshrc and dock, making it more resilient against removal.
- Apple had previously fixed a zero-day exploited by XCSSET, indicating the malware developer’s capabilities.