Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Malware Targets MacOS to Steal Cryptocurrency

New Malware Targets MacOS to Steal Cryptocurrency

Posted on April 23, 2026 By CWS

In early 2026, a new threat emerged for Mac users as a sophisticated malware named notnullOSX began targeting digital asset holders. Designed to steal cryptocurrency from anyone holding digital assets worth over $10,000, this malware poses a significant risk by masquerading as legitimate software throughout its infection process.

Background and Development of notnullOSX

The origins of this malware trace back to 2023, involving a developer known as 0xFFF who vanished from a notorious hacking forum over fears of investigation by security services. Returning in 2024 under the alias alh1mik, he offered a new macOS stealer, which later materialized as notnullOSX. This malicious software was crafted using the Go programming language and distributed through social engineering, a counterfeit wallpaper app, and a compromised YouTube channel.

Distribution and Targeting Tactics

Moonlock Lab detected notnullOSX on March 30, 2026, across Vietnam, Taiwan, and Spain. The malware’s distribution involves sophisticated layers, including fake Google documents and a hijacked YouTube channel. Operators identify targets by submitting forms detailing users’ wallet addresses and balances, ensuring victims have assets exceeding $10,000 before proceeding.

The initial attack vector is a deceptive Google document, leading victims to believe they need to fix an encryption error caused by an outdated API. Options provided either download the malware through a Terminal command or a disk image masquerading as a wallpaper app. The compromised YouTube account used to lure victims had amassed significant views, indicating a hijacking incident.

Functionality and Risks of notnullOSX

Once installed, notnullOSX operates covertly, extracting information from various applications and browser sessions. It can replace legitimate wallet apps with malicious versions to capture seed phrases, maintaining a connection with the attacker’s server for ongoing instructions. This makes it a persistent threat to macOS users.

The infection chain relies on user trust in Terminal commands. A base64 command decodes into a script fetching a binary from a server, bypassing Apple’s security measures by requiring Full Disk Access. This grants the malware comprehensive access to sensitive data without user prompts.

Preventative Measures Against notnullOSX

To mitigate this threat, users should avoid executing Terminal commands from untrusted sources and be wary of applications requesting Full Disk Access. Regular audits of system folders and monitoring for unusual network activities can also help detect unauthorized activities. Security teams should block suspicious connections and flag unusual file downloads for further investigation.

Staying informed and vigilant is crucial as cyber threats evolve. Follow trusted sources for updates on cybersecurity measures and potential threats.

Cyber Security News Tags:cryptocurrency theft, cyber threat, Cybersecurity, digital assets, fake applications, hacking tactics, Mac security, macOS malware, malware prevention, notnullOSX, online safety, tech security, Terminal commands

Post navigation

Previous Post: Chinese Cybersecurity Firm’s AI Claims Rival Top Models
Next Post: Rituals Cosmetics Reveals Member Data Breach Incident

Related Posts

Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Cyber Security News
Microsoft Upgrades .NET Bounty Program with Rewards Up to ,000 Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News
VoidStealer Variant Evades Chrome Security Without Injection VoidStealer Variant Evades Chrome Security Without Injection Cyber Security News
Mozilla Critiques Microsoft’s Copilot Installation Tactics Mozilla Critiques Microsoft’s Copilot Installation Tactics Cyber Security News
Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration
  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration
  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark