- Content source
- https://cybersecuritynews.com/hackers-weaponize-applescript/
Full Story:Threat actors continue to evolve their techniques for bypassing macOS security controls, shifting away from traditional attack vectors that Apple has systematically patched.
Following Apple’s removal of the “right-click and open” Gatekeeper override in August 2024, attackers have identified and weaponized a new delivery mechanism using compiled AppleScript files with deceptive naming conventions.
These .scpt files are increasingly being leveraged to distribute malware that masquerades as legitimate software updates, including fake Zoom and Microsoft Teams installers.
The emerging threat centers on .scpt files that open directly in Script Editor.app by default, creating an attractive attack surface for threat actors.
When users double-click these files, the application displays a user-friendly interface with social engineering prompts encouraging execution.
The malware operators strategically embed malicious code after extensive blank lines to hide the actual payload from casual inspection.
Hackers Weaponize AppleScript to Creatively Deliver macOS Malware Mimic as Zoom/Teams Updates
Attackers now exploit AppleScript (.scpt) files to bypass macOS security, spreading fake Zoom and Teams installers as malware.
cybersecuritynews.com