RustyAttr Unleashed: North Korean Hackers Sneak Trojan into macOS with Metadata Magic!
Hackers are concealing malicious code in macOS extended attributes, delivering a RustyAttr trojan. This clever trick involves hiding code in file metadata and using decoy PDFs to slip past security like a Trojan horse in a tech-savvy toga. The malware, attributed to Lazarus, remains undetected by Virus Total’s security agents.

Hot Take:
Who knew file attributes could carry more than just your favorite cat pictures? Lazarus, the North Korean cyber squad, is back with a quirky new trick up their sleeve, hiding malware in macOS file metadata like a digital version of “Where’s Waldo?” Forget about finding Waldo, just try finding this sneaky trojan! It’s like they’ve turned macOS into their own personal playground, and Apple didn’t even get an invite. Time to get our xattr skills on point, folks, because it seems like the game of hide-and-seek just got real!
Key Points:
- Hackers are using macOS extended attributes to sneak in the RustyAttr trojan.
- The technique involves hiding malicious code in custom file metadata and using decoy PDFs.
- This method is a modern twist on the 2020 Bundlore adware payload concealment strategy.
- Lazarus group, with moderate confidence, is suspected of being behind this novel attack.
- The malware evades detection effectively, bypassing Virus Total security checks.