L0Psec Profile Banner
L0Psec Profile
L0Psec

@L0Psec

Followers
2K
Following
10K
Media
219
Statuses
2K

Father | macOS Security Researcher | RE | arm64 | InfoSec

NC
Joined October 2017
Don't wanna be here? Send us removal request.
@L0Psec
L0Psec
26 days
New RE Video:. In this video, I reverse engineer a malicious SwiftUI dropper. Swift is fun to RE so I thought it would be a good idea :) .Shout out to @txhaflaire for their recent blog post that covers this malware.
1
21
89
@L0Psec
L0Psec
9 hours
Appreciate the share as always @moonlock_lab! I feel it has been a while since we've seen such a readable Infostealer dropper. Unencrypted string commands passed to system() 4x and curl download output piped to osascript.
Tweet media one
@moonlock_lab
Moonlock Lab
1 day
1/7: Our fellow researcher @g0njxa shared juicy info with us: a real #ClickFix-style find! A fake "Installation Instructions" pop-up pushes users to run a malicious bash command via Terminal. We couldn’t resist checking it, and what we uncovered? A multi-stage #macOS #stealer 👇
Tweet media one
0
6
20
@L0Psec
L0Psec
2 days
Appreciate y’all. Thanks for having me as a speaker and being a cool place to hang out at! Got to meet a lot of incredible people there :).
@MalwareVillage
Malware Village
2 days
That wraps up #MalwareVillage.@DEFCON 33! 🥳. Special thanks to all the organizers, sponsors, volunteers, speakers, workshoppers, collaborators, attendees, and everyone involved, for making this event absolutely legendary! 🤩. Thank you all! 🙏
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
3
23
@L0Psec
L0Psec
4 days
Got to talk about Swift RE yesterday at @MalwareVillage #defcon33 which was awesome! Decided to record an RE video while at DEFCON for fun, check it out :).
0
7
37
@L0Psec
L0Psec
6 days
Time for my @MalwareVillage Swift talk tomorrow changed to 3:50pm. Come check it out if you want to see some live macOS malware reversing :) #defcon33
Tweet media one
3
5
26
@L0Psec
L0Psec
6 days
Made it to Vegas for my first #DEFCON :) @defcon
Tweet media one
Tweet media two
Tweet media three
1
2
25
@L0Psec
L0Psec
6 days
Definitely helps make the decompilation look much prettier :).
@vector35
Vector 35
6 days
One of the coolest new things in Binary Ninja 5.1? Pseudo Objective‑C. Huge shoutout to @bdash, who actually wrote this before joining the team (talk about an overkill job application). If you’re digging into iOS, Swift, or kernelcaches, this one’s a game‑changer.
Tweet media one
Tweet media two
0
0
14
@L0Psec
L0Psec
8 days
This will result in the update Mach-O being executed with the credentials captured. There is even an error message if it were to fail :)
Tweet media one
0
1
1
@L0Psec
L0Psec
8 days
There is a closure that is also observed related to the use of osascript which we saw in the first screenshot. Uses the same swift function to grab the path to osascript from 0x100031520 as a Swift object. This is then used to set up another NSTask
Tweet media one
Tweet media two
1
1
1
@L0Psec
L0Psec
8 days
This command and a path to bash are both setup and passed as arguments to the NSTask object through the use of bridging functions to convert Swift objects into NSObjects.
Tweet media one
1
1
1
@L0Psec
L0Psec
8 days
Taking a look at the first address: 0x100031450, we can see the command that will be executed which results in the download to /tmp, clears extended attributes, and sets execute permissions.
Tweet media one
1
1
1
@L0Psec
L0Psec
8 days
The AppDelegate class has a method appropriately named runHiddenUpdateScript() which sets up the NSTask object. Before we get into the NSTask setup, we can see the use of swift_initStaticObject() which references addresses of strings used by NSTask.
Tweet media one
1
1
2
@L0Psec
L0Psec
8 days
This app leverages NSTask for downloading/executing the Infostealer Mach-O. Uses curl to connect to hxxps[:]//specter-storage[.]com/git/update (which already has a couple detections) and downloads the Mach-O named "update". Let's look at how it does this.
Tweet media one
2
1
2
@L0Psec
L0Psec
8 days
Another Swift Dropper for AMOS/AMOS-like variant found by the team:.84bc9007228073f4d73f4e6f7a05f920cd9317033d67d4c0cd375bbb95f13c70. 0 detections on VT since 5/29/25. Let's take a look some of its behavior🧵
Tweet media one
1
20
60
@L0Psec
L0Psec
12 days
RT @objective_see: Slides, recordings, & photos from #OFTW v3.0 in London have posted: 😍
Tweet media one
0
8
0
@L0Psec
L0Psec
13 days
RT @jstrosch: Reversing Mac Malware with L0Psec: Live ARM64 Analysis & Latest Trends
0
7
0
@L0Psec
L0Psec
13 days
RT @jstrosch: 🔥 Live stream starts in an hour - we're reversing Mac malware with L0psec!. Join us on YouTube 👉
0
4
0
@L0Psec
L0Psec
13 days
RT @suyog41: Amos Stealer. Setup_v.2.51.dmg.4fca1804b022996c7e2d26560c29cd11. Setup_v.5.29.dmg.efafbedccf69f98685d78dc1d8bb544b. Setup_v.4.….
0
4
0
@L0Psec
L0Psec
13 days
RT @motuariki_: macOS malware: Amos Stealer variants have been busy. Here are some malicious domains being used to spread them. Hashes conn….
0
14
0
@L0Psec
L0Psec
14 days
Trip to London last week for @objective_see #OFTW. Taught an arm64 class and did a macOS malware reversing demo. Got to see/meet a lot of cool people! Thanks to @andyrozen and @patrickwardle as always. Shoutout to @vector35 for providing binja licenses to students :)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
8
44
@L0Psec
L0Psec
15 days
RT @theevilbit: 🍎🐛macos 15.6 is out, a few new CVEs and mentions. NetAuth.Impact: An app may be able to break out of its sandbox.CVE-202….
0
7
0