CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

FlexibleFerret Malware Chain Targets macOS with Go Backdoor

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new macOS malware campaign, attributed to FlexibleFerret, uses staged scripts, credential-harvesting decoys, and a persistent Go-based backdoor to bypass user safeguards and maintain long-term access. The malware chain includes a second-stage shell script that fetches payloads based on the system architecture, establishes persistence via a LaunchAgent, and uses a decoy application to steal credentials. The Go-based backdoor, named CDrivers, collects system information, executes shell commands, and exfiltrates data via Dropbox. The campaign demonstrates sophisticated techniques to avoid detection, including assembling Dropbox host strings from fragments and querying api.ipify.org to capture victim IP addresses. Organizations are advised to treat unsolicited Terminal-based instructions as high-risk.

Timeline

  1. 25.11.2025 15:45 1 articles · 23h ago

    FlexibleFerret Malware Chain Targets macOS with Go Backdoor

    A new macOS malware campaign, attributed to FlexibleFerret, uses staged scripts, credential-harvesting decoys, and a persistent Go-based backdoor to bypass user safeguards and maintain long-term access. The malware chain includes a second-stage shell script that fetches payloads based on system architecture, establishes persistence via a LaunchAgent, and uses a decoy application to steal credentials. The Go-based backdoor, CDrivers, collects system information, executes shell commands, and exfiltrates data via Dropbox.

    Show sources

Information Snippets