Categories: Cyber Security News

New Wave of Odyssey Stealer Actively Targeting macOS Users

A sophisticated and aggressive malware campaign known as Odyssey Stealer has surged recently, specifically aiming at macOS systems.

This fresh wave of cyber threats has caught the attention of security experts due to its rapid spread and enhanced stealth capabilities.

Unlike previous iterations, this campaign demonstrates a highly coordinated effort to compromise Apple computers worldwide, systematically stealing sensitive user data such as cryptocurrency wallets, login credentials, and personal documents.

Sponsored

The malware typically infects systems through deceptive means, often disguised as legitimate software updates, fake applications, or cracked tools found on dubious websites.

Once inside, it quietly harvests critical information from web browsers like Chrome and Safari, as well as the macOS Keychain.

The impact is severe, ranging from immediate financial loss due to drained crypto accounts to long-term identity theft.

The attackers leverage these advanced techniques to ensure the malware remains undetected while it sends valuable data to remote servers.

Moonlock Lab analysts identified this escalating threat, noting a significant spike in activity over the past few days.

Initially, the telemetry data indicated infections were primarily spreading across the United States, France, and Spain.

However, the picture clearly changed within just twenty-four hours as the campaign aggressively expanded its reach.

The infection vectors have now appeared in the United Kingdom, Germany, Italy, Canada, Brazil, India, and multiple nations across Africa and Asia.

Sponsored
https://twitter.com/moonlock_lab/status/2019528813328125984?ref_src=twsrc%5Etfw

Two map screenshots, taken only one day apart, highlight a rapidly expanding geographic footprint that underscores the viral nature of this specific attack wave.

Advanced Evasion Through Polymorphism

The most alarming aspect of this new Odyssey Stealer campaign is its ability to evade traditional security defenses through automation.

The malware samples analyzed in this wave appear to be auto-generated, a technique that creates a unique digital fingerprint, or hash, for every single infection instance.

While the file size and malicious functionality remain identical, this “polymorphism” ensures that no two files look the same to antivirus scanners relying on static signatures.

By constantly altering its code structure, the malware renders standard blocklists ineffective. Security teams have observed numerous unique SHA256 hashes associated with this single campaign, complicating mitigation efforts.

This level of sophistication suggests the attackers are using automated “builders” to mass-produce undetectable variants, allowing the threat to slip past defenses that would typically catch older, static versions of the stealer. Users must remain vigilant against this evolving danger.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post New Wave of Odyssey Stealer Actively Targeting macOS Users appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Bertrand Russell’s Advice For How (Not) to Grow Old: “Make Your Interests Gradually Wider and More Impersonal”

Image by National Portrait Gallery, via Wikimedia Commons Advice on how to grow old frequently…

8 minutes ago

Domain Value – Builds over time or resets every time it changes hands…

Today: The Appraisal of Intent.gg / The Appraisal of Intent.gg / Help with domain extension…

12 minutes ago

Cisco Secure Firewall Management Vulnerability Allow Attackers to Bypass Authentication

Cisco has released a critical security advisory warning of a severe vulnerability in its Secure…

22 minutes ago

Hackers Mimic LastPass Support Email to Steal Vault Passwords

A new and carefully crafted phishing campaign is currently targeting LastPass users, with attackers sending…

23 minutes ago

Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap

New York, USA, March 4th, 2026, CyberNewswire The industry must pivot to Preemptive Defense: As…

23 minutes ago

Cisco Catalyst SD-WAN Vulnerabilities Allow Attackers to Gain Root Access

An urgent security advisory from Cisco warns that multiple vulnerabilities in Cisco Catalyst SD-WAN Manager…

23 minutes ago

This website uses cookies.