Chinesische Hacker stellen neue Macma macOS-Backdoor-Version bereit

Teilen:

The Chinese hacking group tracked as ‘Evasive Panda’ was spotted using new versions of the Macma backdoor and the Nightdoor Windows malware.

Symantec’s threat hunting team spotted the cyber espionage attacks targeting organizations in Taiwan and an American non-governmental organization in China.

In the latter case, Evasive Panda (aka ‘Daggerfly’ or ‘Bronze Highland’) exploited a flaw in an Apache HTTP server to deliver a new version of their signature modular malware framework, MgBot, indicating a continuous effort to refresh their tools and evade detection.

Evasive Panda is believed to have been active since at least 2012, conducting both domestic and international espionage operations.

Most recently, ESET caught a strange activity where the cyberespionage group used Tencent QQ software updates to infect NGO members in China with the MgBot malware.

The breaches were achieved through a supply chain or an adversary-in-the-middle (AITM) attack, with the uncertainty around the exact attack method used highlighting the sophistication of the threat actor.

Macma linked to Evasive Panda

Macma is a modular malware for macOS, first documented by Google’s TAG in 2021 but never attributed to a specific threat group.

Symantec says recent Macma variants show ongoing development where its creators build upon the existing functionality.

The latest variants seen in suspected Evasive Panda attacks contain the following additions/improvements:

  • New logic to collect a file’s system listing, with the new code based on Tree, a publicly available Linux/Unix utility.
  • Modified code in the AudioRecorderHelper feature
  • Additional parametrisation
  • Additional debug logging
  • Addition of a new file (param2.ini) to set options to adjust screenshot size and aspect ratio

The first indication of a link between Macma and Evasive Panda is that two of the latest variants connect to a command and control (C2) IP address also used by a MgBot dropper.

Most importantly, Macma and other malware on the same group’s toolkit contain code from a single shared library or framework, which provides threat and synchronization primitives, event notifications and timers, data marshaling, and platform-independent abstractions.

Evasive Panda has used this library to build malware for Windows, macOS, Linux, and Android. Since it is not available in any public repositories, Symantec believes it’s a custom framework used exclusively by the threat group.

Other Evasive Panda tools

Another malware that uses the same library is Nightdoor (aka ‘NetMM’), a Windows backdoor that ESET attributed to Evasive Panda a few months ago.

In the attacks Symantec tracked, Nightdoor was configured to connect to OneDrive and fetch a legitimate DAEMON Tools Lite Helper application (‘MeitUD.exe’) and a DLL file (‘Engine.dll’) that creates scheduled tasks for persistence and loads the final payload in memory.

Nightdoor uses an anti-VM code from the ‘al-khaser’ project and ‘cmd.exe’ to interact with C2 via open pipes.

It supports the execution of commands for network and system profiling, such as ‘ipconfig,’ ‘systeminfo,’ ‘tasklist,’ and ‘netstat.’

In addition to the malware tools used by Evasive Panda in attacks, Symantec has also seen threat actors deploy trojanized Android APKs, SMS and DNS request interception tools, and malware built to target obscure Solaris OS systems.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:42 am, Juni 20, 2025
Wetter-Symbol 26°C
L: 25° | H: 27°
overcast clouds
Luftfeuchtigkeit: 54 %
Druck: 1023 mb
Wind: 5 mph E
Windböe: 8 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:42 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
25° | 27°°C 0 mm 0% 11 mph 56 % 1023 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 32°°C 0.43 mm 43% 11 mph 62 % 1020 mb 0 mm/h
So. Juni 22 10:00 pm
Wetter-Symbol
17° | 26°°C 0.86 mm 86% 15 mph 87 % 1014 mb 0 mm/h
Mo. Juni 23 10:00 pm
Wetter-Symbol
14° | 23°°C 0.2 mm 20% 14 mph 80 % 1017 mb 0 mm/h
Di. Juni 24 10:00 pm
Wetter-Symbol
14° | 25°°C 0 mm 0% 16 mph 76 % 1017 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 9 mph 54 % 1023 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 11 mph 48 % 1023 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
22° | 23°°C 0 mm 0% 11 mph 46 % 1022 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 8 mph 56 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 62 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 60 % 1019 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 6 mph 54 % 1019 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
28° | 28°°C 0 mm 0% 9 mph 34 % 1018 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,212.21
0.95%
Ethereum(ETH)
€2,221.05
0.48%
Fesseln(USDT)
€0.87
-0.01%
XRP(XRP)
€1.89
0.29%
Solana(SOL)
€128.91
1.33%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.148233
0.00%
Shiba Inu(SHIB)
€0.000010
0.82%
Pepe(PEPE)
€0.000009
-0.72%
Nach oben scrollen