Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data

Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data

Posted on July 12, 2025July 12, 2025 By CWS

The cybersecurity panorama is witnessing an alarming surge in macOS-targeted information-stealing malware, marking a big shift from the standard Home windows-centric risk mannequin.

These subtle infostealers are quickly evolving to take advantage of macOS environments with unprecedented precision, focusing on helpful knowledge together with browser credentials, cookies, and autofill info that function gateways for ransomware teams and preliminary entry brokers.

The emergence of those macOS infostealers represents a calculated response to the rising enterprise adoption of Apple techniques. Not like their Home windows counterparts, these threats leverage platform-specific assault vectors to bypass conventional safety measures.

The malware’s main goal facilities on harvesting browser-stored knowledge, host info, and put in software particulars, creating complete digital fingerprints of contaminated techniques.

Flashpoint Intel Crew analysts recognized 4 distinguished strains dominating the present risk panorama: Atomic Stealer, acknowledged as probably the most prevalent Malware-as-a-Service providing; Poseidon Stealer, a complicated variant with connections to Atomic’s improvement workforce; Cthulu, one other important MaaS platform; and Banshee, contributing to the increasing ecosystem.

These households collectively course of over 300 million credential units month-to-month, with roughly 50 million distinctive credentials and 6 million never-before-seen entries captured throughout 1.5 million contaminated hosts.

Technical An infection Mechanisms and System Exploitation

The an infection methodology employed by these infostealers demonstrates subtle understanding of macOS structure.

The malware primarily makes use of AppleScript for producing misleading authentication prompts, exploiting consumer belief in reputable system dialogs.

A typical an infection sequence entails:-

show dialog “System Replace Required” with title “macOS Safety Replace” buttons {“Cancel”, “Set up”} default button “Set up”

Following profitable social engineering, the malware executes system profiler instructions to enumerate {hardware} and software program configurations.

The system_profiler SPHardwareDataType command reveals system specs, whereas system_profiler SPApplicationsDataType catalogs put in purposes, offering attackers with detailed reconnaissance knowledge.

Information exfiltration happens by way of HTTP POST requests to command-and-control servers, with collected info compressed utilizing normal archiving utilities.

The malware sometimes targets Safari’s keychain entries, Chrome’s Native State recordsdata, and Firefox’s logins.json databases, systematically harvesting saved credentials earlier than transmission to distant infrastructure.

This technical sophistication, mixed with the speedy evolution of detection evasion strategies, positions macOS infostealers as a formidable risk requiring instant organizational consideration and enhanced safety measures.

Examine dwell malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Attempt ANY.RUN now

Cyber Security News Tags:Actively, Attacking, Data, Infostealers, macOS, Sensitive, Steal, Users, Wild

Post navigation

Previous Post: Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security
Next Post: AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control

Related Posts

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access Cyber Security News
New Research Unmask DPRK IT Workers Email Address and Hiring Patterns New Research Unmask DPRK IT Workers Email Address and Hiring Patterns Cyber Security News
NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard Cyber Security News
New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark