Skip to content

Threat Research Knowledge Base

Careto (The Mask)

Description

Careto (also known as The Mask) is an advanced cyber espionage malware family attributed to a sophisticated threat actor, likely state-sponsored. It targets macOS, Windows, Linux, and mobile platforms with the primary intent of covertly exfiltrating sensitive user data, credentials, encryption keys, and network configurations through multi-stage payloads and encrypted communications.

Get a Free Trial

Variant Names

N/A

Alternative Names

  • The Mask

Country of origin

  • Spain

Symptoms

You might observe the following artifacts associated with this threat:

  • Suspicious or unfamiliar processes running in the background.
  • Presence of unusual encrypted files or hidden directories.
  • Unexpected network traffic or connections to unknown servers.

Technical Breakdown

Careto (The Mask) malware operates through a highly sophisticated modular architecture. Once deployed, it executes a series of actions intended to achieve stealthy data exfiltration. It typically infiltrates systems via spear-phishing campaigns using malicious links or attachments designed to exploit vulnerabilities. Once inside, Careto leverages encrypted communication channels to its command-and-control infrastructure.

Some of Careto’s notable capabilities include:

  • Collecting and exfiltrating encryption keys and credentials.
  • Capturing detailed system and network information.
  • Extracting SSH keys and VPN configurations.
  • Harvesting user activity including browsing histories and documents.
  • Downloading additional modules and payloads for extended functionality.

While primarily known for targeting government agencies, diplomatic institutions, and energy companies, Careto poses significant threats to all targeted platforms including macOS.

Next Steps

Kandji Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect.

While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.

In the future, avoid downloading and installing software from torrent sources or untrusted websites. Ensure that all applications are obtained from official and reputable sources to maintain system integrity and security.

Related

AppleJeus is a sophisticated macOS trojan attributed to North Korea's state-sponsored APT Lazarus Group. This malware has been used for years to infiltrate cryptocurrency exchanges and financial service companies by masquerading as legitimate applications. AppleJeus enables unauthorized access, facilitates data exfiltration, and can lead to significant financial losses.

EvilQuest, also known as ThiefQuest, is a ransomware variant that targets macOS systems. EvilQuest also includes some information stealing and data exfiltration features. It is actively being enhanced with new features to avoid detection.

PasivRobber is a sophisticated macOS surveillance suite discovered in March 2025. It targets applications popular among Chinese users, such as WeChat and QQ, and can exfiltrate sensitive data from various sources, including web browsers, email clients, and system files. The malware employs deceptive naming schemes and a modular architecture, indicating a deep understanding of macOS internals.

Manage and secure your Apple devices at scale.

Laptop and 2 popup windows