Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python Infostealers Expanding to macOS via Fake Ads

Python Infostealers Expanding to macOS via Fake Ads

Posted on February 4, 2026 By CWS

Key Points

  • Information-stealing malware now targets macOS using Python.
  • Fake ads and deceptive installers are key distribution methods.
  • Social engineering tactics like ClickFix are employed.

Growing Threat to macOS Users

Microsoft has issued a warning about the increasing reach of information-stealing malware targeting macOS systems. These attacks exploit cross-platform programming languages, such as Python, and trusted distribution platforms to expand their impact beyond Windows environments. The warning comes as attackers leverage these sophisticated tools to target Apple’s operating system.

The Defender Security Research Team at Microsoft has noted that since late 2025, there has been a noticeable uptick in infostealer campaigns directed at macOS. These campaigns utilize social engineering ploys like ClickFix to trick users into downloading malicious disk image (DMG) installers. These installers deploy a range of malware, including Atomic macOS Stealer (AMOS), MacSync, and DigitStealer, which are designed to extract sensitive information.

Techniques and Targeted Data

Cybercriminals employ a variety of advanced techniques to execute these attacks, including fileless execution and the use of native macOS utilities and AppleScript automation. The primary aim is to siphon off critical data such as web browser credentials, session data, iCloud Keychain information, and developer secrets. The attacks often originate from deceptive ads, particularly those served through Google Ads, which redirect users looking for specific tools to counterfeit sites.

As Microsoft highlights, Python-based infostealers are favored by attackers due to their adaptability and efficiency in targeting diverse systems with minimal effort. These stealers are commonly distributed through phishing emails, gathering login credentials, session cookies, authentication tokens, credit card information, and cryptocurrency wallet data.

Notable Campaigns and Distribution Methods

Among the identified threats is the PXA Stealer, linked to Vietnamese-speaking threat actors, known for collecting login credentials, financial details, and browser information. Microsoft uncovered two PXA Stealer campaigns in October and December 2025, both initiated via phishing emails. The campaigns employed registry Run keys or scheduled tasks for persistence and used Telegram for command-and-control operations and data exfiltration.

Furthermore, threat actors have been observed utilizing popular messaging apps like WhatsApp to distribute malware such as Eternidade Stealer, which targets financial and cryptocurrency accounts. These campaigns were documented by LevelBlue/Trustwave in November 2025, highlighting the diverse methods attackers use to infiltrate systems.

Defensive Measures for Organizations

To mitigate these threats, organizations are urged to educate employees about social engineering tactics, including malvertising, bogus installers, and ClickFix-style prompts. Monitoring for unusual Terminal activity and scrutinizing network egress for suspicious POST requests to new or dubious domains are also recommended. Vigilance against such infostealers is crucial to prevent data breaches, unauthorized access to internal networks, business email compromises, supply chain attacks, and potential ransomware incidents.

Conclusion

The expansion of Python-based infostealers to macOS underscores the need for robust cybersecurity measures. As attackers refine their strategies, staying informed and implementing proactive defenses are vital to safeguarding sensitive information against these evolving threats.

The Hacker News Tags:ClickFix, cyber threats, Cybersecurity, data protection, fake installers, macOS security, Malvertising, Malware, Microsoft warning, phishing attacks, Python infostealers, social engineering, tech news

Post navigation

Previous Post: Critical Chrome Update Fixes High-Severity Vulnerabilities
Next Post: Critical SolarWinds Vulnerability Listed as Actively Exploited

Related Posts

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms The Hacker News
Man-in-the-Middle Attack Prevention Guide Man-in-the-Middle Attack Prevention Guide The Hacker News
AI Agents Act Like Employees With Root Access—Here’s How to Regain Control AI Agents Act Like Employees With Root Access—Here’s How to Regain Control The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Orchid Security Enhances Enterprise Identity Observability
  • Active Directory Breach: Hackers Target NTDS.dit File
  • Critical Docker AI Flaw Enables RCE and Data Breaches
  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Orchid Security Enhances Enterprise Identity Observability
  • Active Directory Breach: Hackers Target NTDS.dit File
  • Critical Docker AI Flaw Enables RCE and Data Breaches
  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark