Skip to content

Automatic translation from Russian to English. It may contain inaccuracies.

Posts

No matter how safe the Apple ecosystem may seem, sometimes unpleasant things happen to it…

September 20, 2025 at 5:28 PMMax Knyazev is typing…Telegram mirror
Post image 1
No matter how safe the Apple ecosystem may seem, sometimes unpleasant things happen to it. And now first things first 👇

Relatively new to MacOS found a backdoor with the cute name ChillyHell. Jamf Threat Labs came across a sample that someone uploaded to VirusTotal in May 2025, but technically it was signed by Apple back in 2021. That is, an officially “trusted” binary, which, if desired, does everything not only “badly”, but directly maliciously. This is a modular C++ backdoor for Intel machines, capable of loading modules, updating itself and sitting in the system for a long time, masquerading as legitimate normal software

What's especially jarring: Mandiant first mentioned a related family of malware back in 2023 and linked them to a group they tracked as UNC4487 ( the materials spoke of a targeted attack on a car insurance website used by government employees in Ukraine ). But then no details were provided, and part of the community simply did not react 🙈 🙉 🙊

Jamf shows that ChillyHell uses three methods of pinning into the system. If you run it as a regular user, it is registered as LaunchAgent; if with elevation of privileges - like LaunchDaemon. And he also has a “backup airfield”: he writes autorun to ~/.zshrc / .bash_profile / .profile, so that every new terminal session brings it up again. In addition, attackers use timestomping - substitution of file timestamps in order to artificially age them and not arouse suspicion.

The modular architecture makes ChillyHell noticeably more dangerous: it supports loading additional components, performing brute-force passwords, collecting local user names for targeted attacks, and stealing credentials - in short, an excellent universal tool for those who are planning a long and targeted attack on an infected machine. At the same time, the publicly accessible sample has been lying in the Dropbox folder since 2021, remaining on the white list 📝

It is not yet clear how many cars were actually damaged. The head of Jamf Threat Labs directly responded that it was “impossible to say” how many computers were infected - but based on the architecture, analysts are inclined to believe that this is not a massive “wave” like a botnet, but a tool for targeted attacks. Apple has already revoked the certificates associated with the sample, but this does not eliminate the threat for those who have had an instance for a long time and exist autonomously

On my own behalf, I’ll add that signatures != security; modularity and multiple autostart mechanisms + timestomping - a recipe for a quiet long-term presence. So if you have poppies ( especially on Intel ), it's time to take off the rose-colored glasses 🐣

What do I recommend?

1️⃣ n Check /Library/LaunchDaemons and ~/Library/LaunchAgents for unusual plists and grep the contents against the names/hashes from the Jamf report

2️⃣ check ~/.zshrc/.bash_profile/.profile for unfamiliar startup lines

3️⃣ Check signed apps, especially those obtained through third party links/Dropbox ( not through the App Store )

4️⃣sandbox suspicious binaries and watch network activity ( C2 communications usually reveal protocol changes from ChillyHell )


Open a terminal and enter the following:

ls ~/Library/LaunchAgents /Library/LaunchDaemons

— see unusual plists

grep -R "applet" ~/Library /Library /Users 2>/dev/null

- simple search by name

grep -E "applet|chrome_render|eDrawMax" -R /Users /Library 2>/dev/null

— search for indicators from the report

Take care of yourself and your devices 😉

#information_security
Open original post on Telegram

Connection graph

How this work connects to others

No explicit connections have been configured for this work yet. You can still open the full graph or the timeline of all works.

Hover over a line to see what connects one work to another.

Use the mouse wheel to zoom the graph and drag it like a map.

Post
100%

Discussion

Comments

Comments are available only to confirmed email subscribers. No separate registration or password is required: a magic link opens a comment session.

Join the discussion

Enter the same email that you already used for your site subscription. We will send you a magic link to open comments on this device.

There are no approved comments here yet.