{"id":101625,"date":"2024-09-05T10:13:12","date_gmt":"2024-09-05T17:13:12","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=101625"},"modified":"2024-10-17T10:09:46","modified_gmt":"2024-10-17T17:09:46","slug":"new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/","title":{"rendered":"New macOS malware HZ RAT gives attackers backdoor access to Macs"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-101620 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-600x400-1.jpg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p>There&#8217;s a new family of Mac malware, and\u2014surprise!\u2014it isn&#8217;t primarily a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer<\/a> this time. <strong>HZ RAT<\/strong> is macOS malware that gives remote attackers complete control of an infected Mac.<\/p>\n<p>Here&#8217;s everything you need to know to stay safe from this new Mac malware threat.<\/p>\n<h3>What does HZ RAT do?<\/h3>\n<p>HZ RAT is a remote access Trojan (RAT)\u2014a tool that gives an attacker full remote administration privileges. The earliest known version of this RAT was observed in 2022 targeting Windows PCs, and now it has arrived on the Mac.<\/p>\n<p>In general, an attacker who controls a RAT can send commands to an infected system just as though they were sitting in front of it. This can potentially include downloading and running additional tools and malware, taking screenshots, logging keystrokes, and more. RATs also allow attackers to do all the typical things stealer malware does\u2014i.e. collecting and exfiltrating sensitive data.<\/p>\n<p>Data collection appears to be one of the main purposes of HZ RAT in particular. The Mac version makes a list of which apps are installed and collects user information from WeChat and DingTalk (Mac apps commonly used in China). It also gathers the username and site combinations from Google Password Manager.<\/p>\n<p>While the collected Google Password Manager data doesn&#8217;t include passwords, the username-and-site pairs could potentially be used along with leaked passwords from past <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/data-breach\/\">data breaches<\/a>; unfortunately, many people reuse passwords across multiple sites.<a name=\"staysafe\"><\/a><\/p>\n<h3>How does HZ RAT spread?<\/h3>\n<p>It isn&#8217;t yet known how victims may have encountered HZ RAT installers in the first place. However, one known Trojan horse that installs HZ RAT is a maliciously modified version of OpenVPN Connect, a common <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-should-connect-to-a-vpn-on-mac-and-ios-and-how-to\/\">VPN<\/a> app.<\/p>\n<p>It&#8217;s possible that this Trojan horse might be distributed through means such as malicious Google Ads that appear at the top of search results (a very common malware distribution tactic in 2024). Or it might be distributed in more targeted, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Watering_hole_attack\" target=\"_blank\" rel=\"noopener\">watering-hole style attacks<\/a>, or through some other distribution method.<\/p>\n<p>In any case, it&#8217;s important to always download apps from the App Store (if available there) or from the original developer&#8217;s site (which, ideally, you&#8217;ve already visited and bookmarked, so you don&#8217;t have to Google it).<\/p>\n<h3>How can I keep my Mac safe from RATs and other malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects these samples as <strong>OSX\/HZRat.ext<\/strong>.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. Just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>Following are SHA-256 hashes of malware samples from this campaign:<\/p>\n<pre>0cca3449ff12cb75c9fd9cf4628b5d72f5ac67d1954dc97d9830436207c4c917\r\n1400210f2eedab36caff8ce89d6d19859ba3116775981b2be8b5069ef109c2c3\r\n1e07585f52be4605be0459bc10c67598eebe8c5d003d6e2d42f4dbbd037e74c1\r\n5d78fc86a389247d768a6bdf46f3e4fd697ed87c133b99ee6865809e453b2908\r\n6210ec0e905717359e01358118781a148b6d63834a54a25a95e32e228598c391\r\n74c92a7bc5f909f4e36d65ee1eb254c438f47f1a7d559d7629bccafd2d2979db\r\n7af7422edf7c558b6215489c020673e195e5eedd99ae330bb90066924f5cf661\r\n87393d937407a6fe9e69dad3836e83866107809980e20a40ae010d7d72f90854\r\nc689113a9a2fca2148caa90f71115c2c2bafeac36edebde4ffc63f87619033a9\r\nd006d5864108094a82315ee60ce057afc8be09546ffaa1f9cc63a51a96764114\r\nd9b0fcd3b20a82b97b4c74deebc7a2abb8fd771eaa12aaf66bdd5cdeaa30f706\r\ne02e264a745e046f2a85ad90698fdd241c7902e73572a54995a8b20349bef940\r\neb7a8ddf8fc13efcc4785226d0085379399c088604a8a451b8800b11e836a5af\r\nf39aafb9489b9b60b34e3d4e78cd9720446b6247531b81cbd4877804b065a25f\r\nf3c101cd1e7be4ce6afe5d0236bfdd5b43870ff03556908f75692585cfd55c55\r\nffeed91c223a718c1afd6d8f059a76ec97eb0eae6c4b2072b343be1b4eba09b8<\/pre>\n<p>This malware campaign leverages the following command-and-control (C2) IP addresses, most of which appear to be located in China:<\/p>\n<pre>20.60.250[.]230\r\n29.40.48[.]21\r\n47.100.65[.]182\r\n58.49.21[.]113\r\n111.21.246[.]147\r\n113.125.92[.]32\r\n120.53.133[.]226\r\n123.232.31[.]206\r\n218.65.110[.]180\r\n218.193.83[.]70<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers may have attempted to contact these IPs in recent weeks, which could indicate a possible infection.<a name=\"other-names\"><\/a><\/p>\n<h3>Do security vendors detect this by any other names?<\/h3>\n<p>Other antivirus vendors&#8217; names for this malware may include variations of the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of OSX\/HZRat.A, ABBackdoor.PNBT-, Backdoor:MacOS\/HZRat.A, Backdoor.HZRat\/OSX!1.10239 (CLASSIC), BackDoor.Rat.504, Backdoor\/OSX.HZRat.57832, Backdoor\/OSX.HZRat.65736, Backdoor\/OSX.HZRat.81033750, Gen:Variant.Trojan.MAC.HZRat.1 (B), HEUR:Backdoor.OSX.HZRat.a, HEUR:Backdoor.OSX.HZRat.gen, MacOS:Agent-ANR [Trj], MacOS:HZRat-A [Trj], MacOS\/ABTrojan.AWJF-, MacOS\/ABTrojan.BFPE-, MacOS\/ABTrojan.DIJE-, MacOS\/ABTrojan.FYPM-, MacOS\/ABTrojan.JIKJ-, MacOS\/ABTrojan.MAOD-, MacOS\/ABTrojan.NRFK-, MacOS\/ABTrojan.RCIO-, MacOS\/ABTrojan.RQNI-, MacOS\/ABTrojan.SZVP-, MacOS\/ABTrojan.URYF-, MacOS\/ABTrojan.XYJG-, MacOS\/ABTrojan.ZCRE-, MacOS\/ABTrojan.ZYUF-, Malware.OSX\/GM.Agent.IJ, Malware.OSX\/GM.HZRat.WL, Osx.Backdoor.Hzrat.Azlw, Osx.Backdoor.Hzrat.Bdhl, Osx.Backdoor.Hzrat.Cgow, Osx.Backdoor.Hzrat.Cwnw, Osx.Backdoor.Hzrat.Iajl, Osx.Backdoor.Hzrat.Kjgl, Osx.Backdoor.Hzrat.Lajl, Osx.Backdoor.Hzrat.Lcnw, Osx.Backdoor.Hzrat.Mqil, Osx.Backdoor.Hzrat.Msmw, Osx.Backdoor.Hzrat.Ogil, Osx.Backdoor.Hzrat.Qimw, Osx.Backdoor.Hzrat.Xtjl, Osx.Backdoor.Hzrat.Zimw, Osx.Backdoor.Hzrat.Zmhl, OSX.Trojan.Gen, OSX\/Agent, OSX\/GM.Agent.IJ, OSX\/HCSSET.ext, OSX\/HZRat-A, OSX\/HZRat.A!tr, OSX\/RootRat, TROJ_FRS.0NA103HU24, Trojan ( 0040f50d1 ), Trojan:MacOS\/HzRat.A!MTB, Trojan:MacOS\/Multiverze, Trojan.MAC.Generic.119695 (B), Trojan.MAC.Generic.119751 (B), Trojan.MAC.Generic.119785 (B), Trojan.MAC.Generic.D1D38F, Trojan.MAC.Generic.D1D3C7, Trojan.MAC.Generic.D1D3E9, Trojan.OSX.Hzrat, Trojan.OSX.HZRat.4!c, Trojan.OSX.HZRat.m!c, Trojan.Trojan.MAC.HZRat.1, Trojan[Backdoor]\/MacOS.HZRat, Trojan[Backdoor]\/OSX.HZRat.gen, UDS:Backdoor.OSX.HZRat, UDS:DangerousObject.Multi.Generic, XAR\/ABTrojan.MJTT-<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more technical details about this malware, you can read Sergy Puzan&#8217;s <a href=\"https:\/\/securelist.com\/hz-rat-attacks-wechat-and-dingtalk\/113513\/\" target=\"_blank\" rel=\"noopener nofollow\">report<\/a>.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.<\/p>\n","protected":false},"author":14,"featured_media":101619,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New macOS malware HZ RAT gives attackers backdoor access to Macs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-05T17:13:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T17:09:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"An evil RAT representing macOS Mac malware emerging from jumping out of Apple MacBook Pro screen OSX\/HZRAT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/\",\"name\":\"New macOS malware HZ RAT gives attackers backdoor access to Macs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#primaryimage\"},\"datePublished\":\"2024-09-05T17:13:12+00:00\",\"dateModified\":\"2024-10-17T17:09:46+00:00\",\"description\":\"HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New macOS malware HZ RAT gives attackers backdoor access to Macs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"New macOS malware HZ RAT gives attackers backdoor access to Macs\",\"datePublished\":\"2024-09-05T17:13:12+00:00\",\"dateModified\":\"2024-10-17T17:09:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#webpage\"},\"wordCount\":997,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg\",\"keywords\":[\"Malware\",\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/","og_locale":"en_US","og_type":"article","og_title":"New macOS malware HZ RAT gives attackers backdoor access to Macs - The Mac Security Blog","og_description":"HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-09-05T17:13:12+00:00","article_modified_time":"2024-10-17T17:09:46+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg","width":400,"height":260,"caption":"An evil RAT representing macOS Mac malware emerging from jumping out of Apple MacBook Pro screen OSX\/HZRAT"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/","name":"New macOS malware HZ RAT gives attackers backdoor access to Macs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#primaryimage"},"datePublished":"2024-09-05T17:13:12+00:00","dateModified":"2024-10-17T17:09:46+00:00","description":"HZ RAT is brand-new macOS malware that gives remote attackers complete control of an infected Mac. Here is everything you need to know to stay protected from this threat.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New macOS malware HZ RAT gives attackers backdoor access to Macs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"New macOS malware HZ RAT gives attackers backdoor access to Macs","datePublished":"2024-09-05T17:13:12+00:00","dateModified":"2024-10-17T17:09:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#webpage"},"wordCount":997,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg","keywords":["Malware","Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-macos-malware-hz-rat-gives-attackers-backdoor-access-to-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/09\/evil-rat-macos-malware-emerging-jumping-from-apple-macbook-pro-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qr7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101625"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=101625"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101625\/revisions"}],"predecessor-version":[{"id":102112,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/101625\/revisions\/102112"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/101619"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=101625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=101625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=101625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}