Geacon Malware Targets Macs

Geacon emerged on Github about four years ago as an implementation of Cobalt Strike Beacon using the Go programming language. While it had been widely forked, SentinelOne hadn't detected its deployment against macOS targets until recently.

Our analysis of the payloads found on VirusTotal indicates a shift in popularity towards two Geacon forks developed by an anonymous Chinese developer who goes by the handle "z3ratu1." In a blog post from late October 2022, z3ratu1 mentioned stumbling upon the Geacon project during a shopping trip, sparking interest in its development guide. Soon after, the first Mach-O Geacon payload was submitted to VirusTotal on November 10 of the same year.

By April of this year, z3ratu1's public projects, geacon_plus and geacon_pro (which may potentially be available for purchase), had garnered nearly 1,000 stars. These projects were added to the 404 Starlink project, a public repository maintained by the Zhizhi Chuangyu Laboratory, dedicated to open source red-team and penetration tools. During that same month, two distinct Geacon payloads were submitted to VirusTotal, one of which exhibited signs of a genuinely malicious campaign.

Geacon Spread Using Two Separate Versions

Geacon exists in two versions: one compiled exclusively for Apple-Intel architecture, and another that also supports Apple silicon. This malware is compatible with macOS versions ranging from OS X 10.9 Mavericks up to the latest releases.

Geacon possesses various functionalities, such as communication and command reception, espionage, data theft, and the ability to download/install additional malicious programs or components. To operate effectively, this malicious software requires the user to grant it administrator privileges.

Furthermore, Geacon seeks permission to access the device's camera, microphone, and various other data like images, photos, and contacts. The malware's control over these device features presents the risk of recording video or audio, which could potentially be exploited for nefarious purposes, such as blackmail.

How Has the Mac Malware Landscape Changed in Recent Years

In recent years, there has been a noticeable surge in the frequency of malware attacks targeting Mac devices. Historically known for their robust security and lower susceptibility to viruses, Mac computers have enjoyed a reputation for being relatively safe from malicious software.

However, as the popularity of Macs continues to rise, cybercriminals have recognized the potential for profit and have shifted their focus towards exploiting vulnerabilities in Apple's ecosystem. This shift has resulted in a steady increase in malware attacks, ranging from adware and ransomware to sophisticated phishing schemes specifically tailored to Mac users.

As a result, Mac users now face a heightened need for vigilance and proactive security measures to safeguard their devices and personal data from these evolving threats.

May 17, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.