Rent-a-Malware: Hackers Now Offering Full macOS Control for Hire

Photorealistic 3D rendering of a cracked metallic apple symbol leaking digital code, symbolising macOS malware infections and cyber threats, in a moody futuristic setting.

For years, Mac users bragged that their computers couldn’t get viruses. You’d hear it at coffee shops, tech meetups, and from that one person in every office who swears they’re “not a Windows person.” But it’s 2025 now, and that myth needs to be put to bed. Macs can get malware. And now, anyone with a bit of crypto and questionable morals can rent a toolkit that lets them take over a Mac like it’s a rental car.

Cybersecurity researchers have discovered two new malware tools for macOS: JokRAT and XenoRAT. These aren’t scripts from some dodgy hacker forum—they’re polished, ready-to-deploy kits that offer full control of a Mac. The kind of full control that lets someone poke around your files, steal your passwords, turn on your webcam, and help themselves to whatever they find interesting. And just to spice things up, you don’t need to be a coding genius to use them. You just need internet access and bad intentions.

This whole Malware-as-a-Service (MaaS) trend is basically cybercrime on easy mode. It's like Netflix, but instead of binge-watching shows, you're binge-hacking systems. These kits come with instructions, dashboards, and yes—customer support. Because even criminals need a help desk, apparently.

Why target Macs now? Because they’ve finally become juicy targets. Businesses are full of Macs—designers use them, developers use them, and let’s not forget C-level execs who love the Apple aesthetic. So if you’re a hacker, why wouldn’t you aim for the stylish, expensive machine with access to the company’s secrets?

XenoRAT is built using .NET MAUI, which makes it able to run on different types of systems. JokRAT, on the other hand, is laser-focused on macOS. Both give attackers the ability to browse files, log keystrokes, steal clipboard data (yes, even that password you copied), and remain hidden even after restarts. These aren't clumsy tools—they’re sleek, silent, and devastating.

The infection methods are frustratingly familiar: a fake update notification, a dodgy email attachment, or a too-good-to-be-true download link. One click, and boom—your Mac is phoning home to a hacker.

Now, Apple does have security features like Gatekeeper and System Integrity Protection. These are good, but they’re not magic. If a user clicks "yes" when macOS says, "Are you sure you want to open this app you found on the internet?", then the malware has all the invitation it needs. It’s like locking your front door but handing the key to a stranger who promises they’re not a burglar.

So what can Mac users actually do to not get completely wrecked by this? Start by using proper security software. Yes, even on a Mac. Next, only install apps from the App Store or known developers. Businesses should manage their Macs with tools that enforce updates and control who can install what. And please, for the love of common sense, educate your users. Show them what a phishing email looks like. Show them how to spot a fake app. Maybe even quiz them. Bribe them with snacks if you have to.

Oh—and those system updates you keep snoozing? Stop it. Install them. They’re literally fixing the holes that let this malware in. Every time you ignore an update, a hacker smiles.

Macs are often used by the people with the most access. If one of these machines gets taken over, it’s not just a personal problem—it could be a company-wide disaster. Private emails, confidential documents, internal systems—it’s all fair game once the attacker’s inside.

The days of thinking Macs are invincible are over. The tools available now are slicker and simpler than ever, and criminals are making good money renting them out. So treat your Mac like any other computer. Lock it down, keep it clean, and don’t assume it’s safe just because it’s shiny.

Noel Bradford

Noel Bradford – Head of Technology at Equate Group, Professional Bullshit Detector, and Full-Time IT Cynic

As Head of Technology at Equate Group, my job description is technically “keeping the lights on,” but in reality, it’s more like “stopping people from setting their own house on fire.” With over 40 years in tech, I’ve seen every IT horror story imaginable—most of them self-inflicted by people who think cybersecurity is just installing antivirus and praying to Saint Norton.

I specialise in cybersecurity for UK businesses, which usually means explaining the difference between ‘MFA’ and ‘WTF’ to directors who still write their passwords on Post-it notes. On Tuesdays, I also help further education colleges navigate Cyber Essentials certification, a process so unnecessarily painful it makes root canal surgery look fun.

My natural habitat? Server rooms held together with zip ties and misplaced optimism, where every cable run is a “temporary fix” from 2012. My mortal enemies? Unmanaged switches, backups that only exist in someone’s imagination, and users who think clicking “Enable Macros” is just fine because it makes the spreadsheet work.

I’m blunt, sarcastic, and genuinely allergic to bullshit. If you want gentle hand-holding and reassuring corporate waffle, you’re in the wrong place. If you want someone who’ll fix your IT, tell you exactly why it broke, and throw in some unsolicited life advice, I’m your man.

Technology isn’t hard. People make it hard. And they make me drink.

https://noelbradford.com
Previous
Previous

Samsung Galaxy S24 Security Disaster: How a Built-In App Left Millions at Risk

Next
Next

Patch Me If You Can: Firewall Vendors Ranked by How Much They Care About Your Security