Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer

Posted on September 5, 2025September 5, 2025 By CWS

A classy cyber marketing campaign is focusing on macOS customers by distributing the potent “Odyssey” data stealer by way of a misleading web site impersonating the official Microsoft Groups obtain web page.

The assault, recognized by researchers at CloudSEK’s TRIAD, leverages a social engineering approach generally known as a “Clickfix” assault to trick victims into executing malicious code that systematically harvests delicate knowledge, establishes long-term persistence, and even replaces official cryptocurrency functions with trojanized variations.

This marketing campaign represents a tactical evolution from an analogous assault reported by Forcepoint in early August 2025, the place risk actors used a faux TradingView web site to ship the identical malware.

By shifting their lure to a trusted enterprise software like Microsoft Groups, the attackers are widening their internet to ensnare a broader vary of victims.

The assault begins when a person lands on a fraudulent webpage designed to appear to be a Microsoft safety verification web page for Groups. The web page instructs the person to resolve a supposed “Uncommon Internet Site visitors” problem by copying a command and pasting it into their macOS Terminal.

faux groups web site

Whereas the web page shows a seemingly innocent command, the “Copy” button truly locations a malicious, base64-encoded AppleScript payload onto the person’s clipboard. When an unsuspecting person executes this command, they unwittingly launch the Odyssey stealer.

Odyssey’s Malicious Payload

As soon as energetic, the malware initiates a multi-stage course of to compromise the system completely:

Credential Theft: The script first makes an attempt to achieve the person’s password by presenting a faux dialog field that reads, “Required Software Helper. Please enter machine password to proceed.” It relentlessly prompts the person till the right password is supplied. This password is then used to entry and steal the macOS login keychain and the Chrome browser’s keychain.

Widespread Knowledge Assortment: Odyssey conducts a complete sweep of the contaminated machine, accumulating an unlimited array of private and monetary data. This contains:

Apple Ecosystem: It extracts the whole Apple Notes database, together with attachments, together with Safari browser knowledge like cookies and saved type values.

Browser Artifacts: The malware targets Chromium-based browsers (Chrome, Edge, Courageous, Opera) and Firefox-based browsers, stealing cookies, internet knowledge, and saved logins. It additionally particularly hunts for knowledge from a protracted listing of browser extensions, specializing in password managers and crypto wallets like MetaMask.

Cryptocurrency Wallets: It recursively copies knowledge from quite a few desktop cryptocurrency wallets, together with Electrum, Exodus, Atomic, Wasabi, Ledger Stay, and Trezor Suite.

Private Information: The stealer searches the person’s Desktop and Paperwork folders for information with extensions like .txt, .pdf, .doc, .pockets, and .key, bundling as much as 10MB of those information for exfiltration.

Exfiltration: All harvested knowledge is compressed right into a single archive file named out.zip in a short lived listing. This file is then despatched to a command-and-control (C2) server positioned on the IP deal with 185.93.89.62. The identical server hosts the login panel for the Odyssey stealer toolkit.

Malware login web page

Persistence and Tampering: To make sure long-term entry, Odyssey creates a LaunchDaemon, a service that runs mechanically at startup. Utilizing the beforehand stolen password for administrator privileges, it installs this backdoor. In a very brazen transfer, the malware kills the official Ledger Stay software course of, deletes the app, and replaces it with a trojanized model downloaded from the C2 server, giving attackers direct management over the person’s crypto {hardware} pockets interactions.

Mitigations

The implications for victims are extreme, starting from credential theft and knowledge breaches to vital monetary losses from compromised cryptocurrency wallets. The persistence mechanism implies that even after a one-time knowledge theft, the system stays compromised and weak to additional assaults.

To defend in opposition to this risk, safety specialists advocate the next measures:

Community Monitoring: Block site visitors to the identified C2 IP deal with (185.93.89[.]62) and monitor for uncommon outbound POST requests containing massive zip information.

Endpoint Safety: Commonly audit /Library/LaunchDaemons/ for suspicious information and search for current, sudden osascript executions.

Consumer Vigilance: Train excessive warning when web sites request that you just run instructions within the Terminal. Confirm the authenticity of obtain pages earlier than continuing.

Incident Response: If an an infection is suspected, instantly reset all vital passwords (Apple ID, electronic mail, banking, crypto wallets) from a clear system. Take away the trojanized Ledger Stay software and contemplate a full system wipe and rebuild to make sure full elimination of the malware.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Deploy, Fake, Hackers, macOS, Microsoft, Odyssey, Site, Stealer, Teams, Weaponize

Post navigation

Previous Post: How to Close the AI Governance Gap in Software Development
Next Post: New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers

Related Posts

Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News
Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News
Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization Cyber Security News
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Cyber Security News
Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations
  • Wealthsimple Data Breach Exposes Personal Information of Some Users
  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
  • Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations
  • Wealthsimple Data Breach Exposes Personal Information of Some Users
  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
  • Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News