Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

The ChillyHell backdoor returns to threaten macOS systems.

Redazione RHC : 15 September 2025 07:39

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which appears to have infected computers undetected for years. A sample of the malware was discovered in May 2025 on VirusTotal, although traces of its activity date back at least to 2021.

ChillyHell is written in C++ and targets Intel architectures. It was first studied by members of the Mandiant team in 2023, when they linked the backdoor to the UNC4487 group. The team hacked a Ukrainian car insurance website used by government employees to book travel. Despite Mandiant’s publication, the sample itself was not flagged as malicious at the time, allowing it to continue spreading undetected by antivirus software.

Most alarmingly, the discovered copy was found to be signed by the developer and was notarized by Apple in 2021. Jamf Threat Labs researchers Ferdous Saljuki and Maggie Zirnheltnoted that the functionality of the version almost completely matches the previously described sample. At the same time, the file has been freely available in the Dropbox public folder for four years and could infect systems while remaining in the trusted category.

Dai potere alla tua programmazione con TypeScript funzionale

Impara a scrivere codice modulare, sicuro e scalabile con il nostro corso pratico di Programmazione Funzionale in TypeScript, guidato dall’esperto Pietro Grandi, professionista nello sviluppo del software. 
In 6 ore e 29 lezioni, esplorerai concetti fondamentali come immutabilità, funzioni pure, higher-order functions e monadi, applicandoli direttamente al mondo reale dello sviluppo software.
Il corso è pensato per sviluppatori, team leader e professionisti del software che desiderano migliorare la qualità e la manutenibilità del loro codice. Con esempi pratici, esercizi e la guida esperta di Grandi, acquisirai competenze avanzate per affrontare le sfide moderne dello sviluppo.
Approfitta della promo e scrivi subito all'amministrazione e guarda l'anteprima gratuita del corso su academy.redhotcyber.com
Contattaci per ulteriori informazioni tramite WhatsApp al 375 593 1011 oppure scrivi a [email protected]



Supporta RHC attraverso:
  1. L'acquisto del fumetto sul Cybersecurity Awareness
  2. Ascoltando i nostri Podcast
  3. Seguendo RHC su WhatsApp
  4. Seguendo RHC su Telegram
  5. Scarica gratuitamente "Dark Mirror", il report sul ransomware di Dark Lab

Se ti piacciono le novità e gli articoli riportati su di Red Hot Cyber, iscriviti immediatamente alla newsletter settimanale per non perdere nessun articolo. La newsletter generalmente viene inviata ai nostri lettori ad inizio settimana, indicativamente di lunedì.
 

It is unknown how widespread ChillyHell was. According to Jaron Bradley, head of Jamf Threat Labs, it is “impossible to say” how many systems were affected. Based on the backdoor’s architecture, analysts tend to believe it was created by a group of cybercriminals and used in more targeted attacks rather than en masse. Apple has already revoked the certificates of developers associated with ChillyHell.

The backdoor has three mechanisms for system persistence. If the program is launched with user privileges, it registers itself as LaunchAgent; with elevated privileges, it registers itself as LaunchDaemon. Additionally, a backup method is used: modifying the user shell configuration files (.zshrc, .bash_profile, or .profile), which incorporate the autorun command, which triggers ChillyHell to be activated with each new terminal session.

To remain invisible, it uses a rare macOS tactic called timestomping, in which malicious files are assigned timestamps that correspond to legitimate objects to avoid being noticed. ChillyHell also switches between command-and-control protocols, making detection much more difficult.

The modular architecture allows attackers to flexibly expand functionality after deployment. The backdoor can download new versions of se itself, install additional components, perform brute-force attacks, save local usernames for future hacking attempts, and initiate credential theft. This combination makes it a convenient platform for further attacks and long-term presence on the system.

The researchers emphasize that the combination of persistence mechanisms, the variety of communication protocols, and the modular design make ChillyHell an extremely flexible tool. They also note that it has been subjected to Apple’s authentication process, demonstrating that malware is not always digitally signed.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli