SentinelOne has noticed a rise in Geacon payloads on VirusTotal in recent months, likely as a result of malicious actors attempting to target Apple macOS systems. Geacon is a Go version of Cobalt Strike, a tool designed for red teaming and adversary simulation, and it has a wide range of capabilities, such as downloading payloads, exfiltrating data, and establishing network communications. Geacon is hidden in a malicious application, and can evade antivirus engines such as Microsoft Defender, Kaspersky, and Qihoo 360 360 Core Crystal. Geacon is being used to deploy backdoors and information stealers, so security teams should make sure they have the necessary protections in place.
Source: Hackernews
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.