macOS Adload Pivots Just Days After Apples XProtect Clampdown
The report analyzes a new variant of the Adload adware that evades Apples recent XProtect malware signature updates. Despite Apple adding 74 new rules targeting Adload in XProtect version 2192 the adware authors have rapidly modified their code to bypass these detections The report examines a specific 4.55MB Intel x86_64 dropper sample that employs Go language components and connects to hardcoded domains for retrieving next-stage payloads. While undetected by most antivirus engines on VirusTotal SentinelOnes multi-engine platform effectively identifies and blocks this Adload variant.