Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

Posted on January 23, 2026January 23, 2026 By CWS

A complicated macOS malware referred to as MacSync has emerged as a harmful new menace focusing on cryptocurrency customers by way of misleading social engineering techniques.

The infostealer operates as an reasonably priced Malware-as-a-Service software designed to reap delicate information from macOS techniques by convincing victims to stick a single command into their Terminal software.

Safety researchers found MacSync whereas investigating phishing infrastructure mimicking Microsoft login pages.

The assault redirects customers to a faux cloud storage installer web page that shows step-by-step directions for finishing an set up utilizing Terminal.

Pretend obtain web page (Supply – CloudSEK)

The malware represents an evolution of the sooner Mac.c stealer and has gained reputation amongst cybercriminals as a consequence of its low value level and modular design targeted on cryptocurrency information theft.

The an infection course of exploits person belief in normal macOS set up workflows. Victims encounter a convincing touchdown web page styled to resemble reliable software program, full with reassuring language and a “Verified Writer” badge.

A easy one-liner command copied to the clipboard triggers the whole compromise, utterly bypassing macOS safety protections like Gatekeeper and code notarization checks that will block conventional software packages.

Quick Zsh script (Supply – CloudSEK)

CloudSEK analysts recognized and analyzed the whole an infection chain, discovering MacSync’s multi-stage assault mechanism that operates totally by way of scripts relatively than compiled binaries.

The malware first downloads a daemonized Zsh loader that detaches from the Terminal session and executes silently within the background. This loader then fetches and runs a distant AppleScript payload containing the core data-stealing performance.

The An infection Mechanism and Information Harvesting Technique

MacSync’s major goal focuses on extracting cryptocurrency-related information by way of a extremely focused strategy.

As soon as executed, the malware shows faux system dialogs repeatedly demanding the sufferer’s login password underneath the pretense of system verification.

This social engineering tactic proves remarkably efficient as a result of persistent dialogs ultimately put on down person resistance.

After acquiring the password, MacSync systematically harvests browser profiles from Chrome, Courageous, Edge, Opera, and different Chromium-based browsers, extracting saved passwords and authentication cookies.

The infostealer particularly targets dozens of cryptocurrency pockets browser extensions by figuring out their set up directories and copying pockets seed phrases and personal keys. Desktop pockets purposes like Exodus, Electrum, and Bitcoin Core obtain comparable remedy.

Error Introduction (Supply – CloudSEK)

The malware moreover steals SSH keys, AWS credentials, Keychain databases, and Apple Notes containing delicate data.

To take care of long-term entry, MacSync conditionally trojanizes {hardware} pockets purposes like Ledger and Trezor when detected on contaminated techniques.

MacSync An infection Chain (Supply – CloudSEK)

The malware overwrites important software elements and replaces reliable software program with malicious variations that show convincing phishing wizards capturing PINs and restoration phrases weeks or months after preliminary an infection.

The supporting infrastructure makes use of a minimum of eight rotating C2 domains following constant naming patterns, with a number of variant lure pages indicating energetic marketing campaign evolution.

This infrastructure reuse and modular design exhibit that MacSync represents an ongoing, scalable operation focusing on the macOS cryptocurrency neighborhood by way of misleading social engineering techniques.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, ClickFixStyle, Command, InfoStealer, Leverage, macOS, MacSync, Pasting, Single, Terminal, Trick, Users

Post navigation

Previous Post: Top 10 Best Data Security Companies in 2026
Next Post: CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Related Posts

SoundCloud Data Breach Exposes 29.8 Million Personal users Details SoundCloud Data Breach Exposes 29.8 Million Personal users Details Cyber Security News
Critical XSS Flaws in Foxit PDF Editor Expose Users to Risk Critical XSS Flaws in Foxit PDF Editor Expose Users to Risk Cyber Security News
5 Asian Cities Where Cybersecurity Maturity Meets Innovation 5 Asian Cities Where Cybersecurity Maturity Meets Innovation Cyber Security News
Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
FBI Warns of Hackers Altering Photos Found on Social Media to Use as Fake Proof FBI Warns of Hackers Altering Photos Found on Social Media to Use as Fake Proof Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News