<\/a><\/figure>\n\n\n\nOnce the user inputs their credentials, the malware stores them in a directory and uses Chainbreak to dump Keychain passwords. Then the malware creates a zip archive of the stolen data, which includes system and network information, and sends a notification to a command-and-control (C2) server. The malware also gathers system info, including IP address and hardware\/software information.<\/gwmw><\/p>\n\n\n\n