LightSpy malware has made a comeback, and this time it's coming after your macOS devices
The LightSpy malware is back, and this time threat actors are targeting macOS devices with improved detection-evasion techniques


The return of LightSpy malware has prompted warnings from security experts over the potential risk to businesses running macOS devices.
LightSpy malware first rose to prominence in 2020, but this variant only targeted iOS devices, whereas new research claims this new version was built to compromise Apple’s desktop machines.
The updated version of LightSpy was initially discovered by Blackberry, but the security and IoT company claimed the malware still targeted mobile devices, whereas a later report by SMB security specialist Huntress claimed this was incorrect and the new version in fact affects Apple’s desktop operating system.
Huntress’ report, issued on 25 April 2024, challenged Blackberry’s assertion, arguing the sample referred to by Blackberry only targets the macOS platform.
By way of evidence, Huntress pointed to the fact that the sample’s binaries were all compiled for the x86_64 architecture, which precludes the ARM architecture used in iPhones.
Huntress also contested Blackberry’s claims the new threat campaign is predominantly targeting individuals in Southern Asia, arguing this claim is based solely on the fact that the malware sample was uploaded in India.
To remove any doubt, Stuart Ashenbrenner and Alden Schmidt of Huntress tested this by running the ‘file’ command against the macOS and iOS samples.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Ashenbrenner and Schmidt found that although the structure of the implant is the same in both variants, the macOS version appears to be more refined than the iOS version.
Both versions used a dropper to load a series of dynamically loaded modules (dylibs), similar to DLLs on Windows, which are responsible for most of the malware’s malicious capabilities.
But the report noted the new version of LightSpy boasts significantly improved operational security (opsec), more mature development practices, and generally better organization.
For example, the iOS version stored its C2 information in plaintext, whereas its MacOS counterpart uses a plugin manifest which should help prevent static detections.
What businesses need to know about LightSpy malware
In its weekly threat intelligence report, security firm Check Point said the spyware’s resurgence indicates “an escalation in cyber threats against macOS users”, noting the sophisticated techniques it is employing such as payload encryption and dynamic module loading.
Huntress said Apple is clearly aware of this elevated threat level and has introduced a number of new features to try and shore up the platform, including a Lockdown Mode that will reduce functionality to limit the target’s attack surface.
Apple also recently brought in additional restrictions for its transparency consent and control (TCC) framework, which manages access to sensitive data stored on macOS devices.
Huntress included some detection opportunities for businesses looking to safeguard their devices, providing a full list of the indicators of compromise (IOC) for all of the key elements of the updated variant.
RELATED WHITEPAPER
Ashenbrenner and Schmidt also created a number of rules for the YARA and Sigma detection tools to help businesses freely detect core parts of the macOS LightSpy’s variant including the implant, loader, and dylibs.
This includes a private rule to assist in paring down detections to Macho binaries, and businesses should remember that without this private rule in place the other rules will not run.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
XLoader malware rises again on macOS disguised as ‘OfficeNote’ app
News Mac users menaced by an old malware enemy dressed up as a Microsoft productivity app
By Richard Speed
-
Zoom patches privilege escalation flaw for macOS users
News Threat actors were able to use the application’s updater to distribute malicious files at superuser level
By Rory Bathgate
-
Mysterious MacOS spyware discovered using public cloud storage as its control server
News Researchers have warned that little is known about the 'CloudMensis' malware, including how it is distributed and who is behind it
By Rory Bathgate
-
Trojan targets Mac OS X Lion anti-malware
News F-Secure finds a nasty piece of malware that disables Lion OS defences.
By Miya Knights
-
Mac OS vulnerabilities skyrocket
News Mac OS vulnerabilities have risen by over five times, leading Panda Security to launch an anti-virus product for the operating system.
By Tom Brewster
-
Apple admits anti-virus need for Mac OS
News Mac users may think they are safe, but Apple admits that users should be running anti-virus software on their systems.
By Asavin Wattanajantra