macOS Targeted as Infostealer Attacks Abuse Python and Trusted Services

macOS Targeted as Infostealer Attacks Abuse Python and Trusted Services
macOS Targeted as Infostealer Attacks Abuse Python and Trusted Services
Infostealer malware is spreading fast beyond Windows, now hitting macOS hard. Attackers use Python code and trusted apps to steal credentials quietly.

Since late 2025, Microsoft Defender Experts spotted macOS campaigns with fake sites, ClickFix tricks, and bad DMG files.

These drop stealers like DigitStealer, MacSync, and Atomic macOS Stealer (AMOS). The malware runs without files, taps macOS tools, and grabs browser data, keychains, and dev secrets via AppleScript.

Python stealers help attackers tweak code quickly for any OS. Others hijack WhatsApp and PDF tools to push malware like Eternidade Stealer, targeting bank logins and crypto wallets. Stolen info leads to account hacks, money loss, and business breaches.

macOS Tricks, Python Phishing, and App Abuse

Mac users face fake Google Ads and sites pushing bad downloads or Terminal commands. ClickFix scams make victims paste code that installs DigitStealer (via fake DynamicLake apps), MacSync (Terminal pastes), or AMOS (AI tool fakes).

All three snag browser passwords, crypto wallets, cloud keys, and dev tokens, then zip and send data to attacker servers before cleanup.

Python stealers like PXA surged in 2025, tied to Vietnamese actors hitting governments via phishing. They use Telegram for C2, obfuscated scripts, DLL sideloading, and fake svchost.exe processes.

Campaigns in October and December set persistence with Run keys or tasks, exfil data via Telegram.

Attackers abuse WhatsApp for worm-like spread. A November 2025 campaign starts with VBS dropping batch files and PowerShell.

It grabs contacts, sends bad messages, and drops Eternidade Stealer via MSI. This Delphi tool watches for bank sites like Bradesco, Binance, and MetaMask.

A September Crystal PDF scam used malvertising. The fake editor sets scheduled tasks, steals Chrome/Firefox cookies and sessions from AppData.

Mitigations, Detections, and IOCs

Block these with user training on fake installers and Terminal risks. Watch Terminal for curl, base64, gunzip, osascript. Flag Keychain access, ZIPs in /tmp, odd POSTs to new domains.

Use Microsoft Defender XDR: cloud protection, EDR block mode, network/web guards, SmartScreen, auto-remediation, tamper protection. Attack surface rules block obfuscated scripts, untrusted executables, JS/VBS downloads.

Defender spots execution (PowerShell curls, osascript), persistence (Run keys, LaunchAgents), evasion (DLL side-loading, certutil), credential grabs, discovery (WMI/Python), C2, collection (ZIPs), exfil (curl).

Hunt with queries like these for DigitStealer:

// Suspicious DMG mounting
DeviceProcessEvents
| where FileName has_any ('mount_hfs', 'mount')
| where ProcessCommandLine has_all ('-o nodev' , '-o quarantine')
| where ProcessCommandLine contains '/Volumes/Install DynamicLake'

Similar KQL for MacSync curls, AMOS mounts, PXA svchost.exe, WhatsApp VBS drops, CrystalPDF tasks.

Key IOCs (samples):

IndicatorTypeDescription
3e20ddb90291ac17cef9913edd5ba91cd95437da86e396757c9d871a82b1282aSHA-256DigitStealer payload
42d51feea16eac568989ab73906bbfdd41641ee3752596393a875f85ecf06417SHA-256AMOS payload
2c885d1709e2ebfcaa81e998d199b29e982a7559b9d72e5db0e70bf31b183a5fSHA-256WhatsApp campaign
598da788600747cf3fa1f25cb4fa1e029eca1442316709c137690e645a0872bbSHA-256Crystal PDF payload
dynamiclake[.]orgDomainDigitStealer delivery
barbermoo[.]couponsDomainMacSync C2
alli-ai[.]proDomainAMOS redirect
bagumedios[.]cloudDomainPXA C2

Check Threat Analytics for MacSync and Crystal PDF intel. Organizations should scan now these cross-platform stealers blend in and evade old defenses.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post macOS Targeted as Infostealer Attacks Abuse Python and Trusted Services appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading