Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ModStealer Evade Antivirus Detection to Attack macOS Users and Steal Sensitive Data

Posted on September 29, 2025September 29, 2025 By CWS

A complicated new cross-platform info stealer often called ModStealer has emerged, focusing on macOS customers and demonstrating regarding capabilities to evade Apple’s built-in safety mechanisms.

The malware represents the newest evolution in macOS-focused threats, which have seen a dramatic surge all through 2024 and proceed accelerating into the present 12 months.

ModStealer follows established patterns seen in different macOS stealers however introduces distinctive persistence mechanisms that set it aside from predecessors like Atomic Stealer.

The malware primarily targets builders and cryptocurrency holders by social engineering campaigns involving faux job commercials and recruitment alternatives, making the most of these teams’ beneficial digital property and frequent interplay with on-line growth sources.

Preliminary reviews from cybersecurity agency Mosyle point out that ModStealer first appeared on VirusTotal roughly one month in the past.

Moonlock analysts recognized the malware’s cross-platform nature, enabling it to compromise macOS, Home windows, and Linux techniques concurrently.

This versatility makes ModStealer notably harmful, as risk actors can deploy unified campaigns throughout a number of working techniques somewhat than sustaining separate malware variants for every platform.

The malware’s capabilities prolong past typical information theft operations. ModStealer can infiltrate over 50 browser extensions throughout Chrome and Safari platforms, with Safari focusing on being comparatively unusual amongst info stealers.

The malware extracts information from cryptocurrency pockets extensions, captures clipboard contents containing seed phrases and personal keys, takes screenshots of seen consumer information, and harvests saved browser info together with native storage databases, cookies, and saved credentials.

Superior Persistence By means of LaunchAgent Abuse

ModStealer’s most notable technical innovation lies in its persistence mechanism on macOS techniques.

Somewhat than using conventional persistence strategies, the malware leverages Apple’s native launchctl utility to embed itself as a LaunchAgent inside the system’s startup processes.

This strategy permits ModStealer to take care of long-term, undetectable presence on compromised Mac units by masquerading as legit system processes.

The malware creates hidden payload information corresponding to “sysupdater.dat” to retailer its elements whereas establishing persistence by macOS LaunchAgent configurations.

This system successfully bypasses many detection techniques that concentrate on monitoring unauthorized modifications to system information or registry entries.

By using Apple’s personal instruments and frameworks, ModStealer presents itself as legit system exercise, making detection considerably more difficult for each automated safety options and guide evaluation.

A VirusTotal consumer remark reveals how they have been contacted by a faux recruiter impersonating a recognized LinkedIn account (Supply – Moonlock)

As soon as established, ModStealer maintains communication with command-and-control servers to obtain further directions, extract collected information, and probably facilitate lateral motion inside compromised networks.

This persistent connection permits risk actors to repeatedly harvest delicate info and adapt their operations based mostly on the precise surroundings of every sufferer system.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Antivirus, Attack, Data, Detection, Evade, macOS, ModStealer, Sensitive, Steal, Users

Post navigation

Previous Post: The State of AI in the SOC 2025
Next Post: Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data

Related Posts

MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines Cyber Security News
Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak Cyber Security News
CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News