Malware, Data Security

New MacStealer malware examined

BleepingComputer reports that Mac devices running from macOS Catalina to macOS Ventura are being targeted by the new MacStealer information-stealing malware, which has the capability to exfiltrate iCloud KeyChain data and browser-stored information, as well as cryptocurrency wallets and other sensitive data. MacStealer has been deployed as an unsigned DMG file, which when executed would trigger a fake password prompt to run a command enabling password collection, according to a report from Uptycs. After conducting the data gathering process, MacStealer proceeds to store the data in a ZIP file, which is then delivered to remote command-and-control servers. Certain data is also being concurrently sent by the malware to a pre-configured Telegram channel, enabling quick notifications to attackers regarding the theft of new data, said researchers. The emergence of MacStealer comes a month after the discovery of another information-stealing malware by security researcher iamdeadlyz. Such malware was deployed in a phishing campaign aimed at individuals playing the blockchain game "The Sandbox."

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds