MacStealer Malware Plucks Bushels of Data From Apple Users

  /     /     /  
Publicated : 23/11/2024   Category : security


MacStealer Malware Plucks Bushels of Data From Apple Users


A novel cyber threat against macOS users is being sold for $100 a pop on the Dark Web, and activity is ramping up.



An information-stealing malware that targets Apples macOS operating system is making the cyberrounds, siphoning off documents, iCloud keychain data-like passwords, browser cookies, and more from unwitting Apple users.
Appropriately dubbed MacStealer, its going for just $100 per build on the cyber underground, so its no surprise that more MacStealer samples have been spreading recently, according to a recent
Uptycs analysis on the threat
.
The malware affects the Catalina version of macOS and subsequent versions that use Intel M1 and M2 CPUs. It also uses the encrypted Telegram messaging platform for command-and-control (C2), the researchers found.
To propagate, operators are looking for low-hanging fruit, hoping to harvest victims by luring them to download .DMG files, which are containers for macOS apps. Fake apps in app stores, piracy websites, or email attachments could all be potential conduits for infection.
The bad actor uses a .DMG file to spread the malware. After a user executes the file, it opens a fake password prompt, Uptycs researchers explained in the post. Once the user enters their login credentials, the stealer … [compresses] the data and sends it to C2 via a POST request using a Python User-Agent request. It deletes the data and ZIP file from the victims system during a subsequent mop-up operation.
This is just the latest malware to target Macs in recent months. In February,
pirated versions of Apples Final Cut Pro
video-editing software were found delivering a version of the XMRig cryptocurrency mining tool. And last year, a previously-unknown,
macOS spyware called CloudMensis
surfaced in a highly targeted campaign, exfiltrating documents, keystrokes, screen captures, and more from Apple machines.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
MacStealer Malware Plucks Bushels of Data From Apple Users