Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

Posted on January 23, 2026January 23, 2026 By CWS

A complicated macOS malware referred to as MacSync has emerged as a harmful new menace focusing on cryptocurrency customers by way of misleading social engineering techniques.

The infostealer operates as an reasonably priced Malware-as-a-Service software designed to reap delicate information from macOS techniques by convincing victims to stick a single command into their Terminal software.

Safety researchers found MacSync whereas investigating phishing infrastructure mimicking Microsoft login pages.

The assault redirects customers to a faux cloud storage installer web page that shows step-by-step directions for finishing an set up utilizing Terminal.

Pretend obtain web page (Supply – CloudSEK)

The malware represents an evolution of the sooner Mac.c stealer and has gained reputation amongst cybercriminals as a consequence of its low value level and modular design targeted on cryptocurrency information theft.

The an infection course of exploits person belief in normal macOS set up workflows. Victims encounter a convincing touchdown web page styled to resemble reliable software program, full with reassuring language and a “Verified Writer” badge.

A easy one-liner command copied to the clipboard triggers the whole compromise, utterly bypassing macOS safety protections like Gatekeeper and code notarization checks that will block conventional software packages.

Quick Zsh script (Supply – CloudSEK)

CloudSEK analysts recognized and analyzed the whole an infection chain, discovering MacSync’s multi-stage assault mechanism that operates totally by way of scripts relatively than compiled binaries.

The malware first downloads a daemonized Zsh loader that detaches from the Terminal session and executes silently within the background. This loader then fetches and runs a distant AppleScript payload containing the core data-stealing performance.

The An infection Mechanism and Information Harvesting Technique

MacSync’s major goal focuses on extracting cryptocurrency-related information by way of a extremely focused strategy.

As soon as executed, the malware shows faux system dialogs repeatedly demanding the sufferer’s login password underneath the pretense of system verification.

This social engineering tactic proves remarkably efficient as a result of persistent dialogs ultimately put on down person resistance.

After acquiring the password, MacSync systematically harvests browser profiles from Chrome, Courageous, Edge, Opera, and different Chromium-based browsers, extracting saved passwords and authentication cookies.

The infostealer particularly targets dozens of cryptocurrency pockets browser extensions by figuring out their set up directories and copying pockets seed phrases and personal keys. Desktop pockets purposes like Exodus, Electrum, and Bitcoin Core obtain comparable remedy.

Error Introduction (Supply – CloudSEK)

The malware moreover steals SSH keys, AWS credentials, Keychain databases, and Apple Notes containing delicate data.

To take care of long-term entry, MacSync conditionally trojanizes {hardware} pockets purposes like Ledger and Trezor when detected on contaminated techniques.

MacSync An infection Chain (Supply – CloudSEK)

The malware overwrites important software elements and replaces reliable software program with malicious variations that show convincing phishing wizards capturing PINs and restoration phrases weeks or months after preliminary an infection.

The supporting infrastructure makes use of a minimum of eight rotating C2 domains following constant naming patterns, with a number of variant lure pages indicating energetic marketing campaign evolution.

This infrastructure reuse and modular design exhibit that MacSync represents an ongoing, scalable operation focusing on the macOS cryptocurrency neighborhood by way of misleading social engineering techniques.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, ClickFixStyle, Command, InfoStealer, Leverage, macOS, MacSync, Pasting, Single, Terminal, Trick, Users

Post navigation

Previous Post: Top 10 Best Data Security Companies in 2026
Next Post: CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Related Posts

Microsoft 365 Outage Blocks Access to Teams, Exchange Online, and Admin Center Cyber Security News
KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins Cyber Security News
Preventing Phishing Attacks on Cryptocurrency Exchanges Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News
Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
  • Top 10 Best Data Security Companies in 2026
  • Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
  • In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark