Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/Threats/New Odyssey Stealer Wave Actively Targets macOS Users
Threats

New Odyssey Stealer Wave Actively Targets macOS Users

Odyssey Stealer, a sophisticated and aggressive malware campaign, has recently intensified its active targeting of macOS systems. This fresh wave of cyber threats has caught the attention of security...

Jennifer sherman
Jennifer sherman
February 6, 2026 3 Min Read
7 0

Odyssey Stealer, a sophisticated and aggressive malware campaign, has recently intensified its active targeting of macOS systems.

This fresh wave of cyber threats has caught the attention of security experts due to its rapid spread and enhanced stealth capabilities.

Unlike previous iterations, this campaign demonstrates a highly coordinated effort to compromise Apple computers worldwide, systematically stealing sensitive user data such as cryptocurrency wallets, login credentials, and personal documents.

The malware typically infects systems through deceptive means, often disguised as legitimate software updates, fake applications, or cracked tools found on dubious websites.

Once inside, it quietly harvests critical information from web browsers like Chrome and Safari, as well as the macOS Keychain.

The impact is severe, ranging from immediate financial loss due to drained crypto accounts to long-term identity theft.

The attackers leverage these advanced techniques to ensure the malware remains undetected while it sends valuable data to remote servers.

Moonlock Lab analysts identified this escalating threat, noting a significant spike in activity over the past few days.

Initially, the telemetry data indicated infections were primarily spreading across the United States, France, and Spain.

However, the picture clearly changed within just twenty-four hours as the campaign aggressively expanded its reach.

The infection vectors have now appeared in the United Kingdom, Germany, Italy, Canada, Brazil, India, and multiple nations across Africa and Asia.

1/ We’re tracking a fresh wave of #Odyssey #Stealer activity targeting #macOS users.
Over the past days, our telemetry showed newly updated samples spreading primarily across:
🇺🇸 United States
🇫🇷 France
🇪🇸 Spain

Today, the picture has clearly changed: the same Odyssey campaign… pic.twitter.com/o8gOWrtPIh

— Moonlock Lab (@moonlock_lab) February 5, 2026

Two map screenshots, taken only one day apart, highlight a rapidly expanding geographic footprint that underscores the viral nature of this specific attack wave.

Advanced Evasion Through Polymorphism

The most alarming aspect of this new Odyssey Stealer campaign is its ability to evade traditional security defenses through automation.

The malware samples analyzed in this wave appear to be auto-generated, a technique that creates a unique digital fingerprint, or hash, for every single infection instance.

While the file size and malicious functionality remain identical, this “polymorphism” ensures that no two files look the same to antivirus scanners relying on static signatures.

By constantly altering its code structure, the malware renders standard blocklists ineffective. Security teams have observed numerous unique SHA256 hashes associated with this single campaign, complicating mitigation efforts.

This level of sophistication suggests the attackers are using automated “builders” to mass-produce undetectable variants, allowing the threat to slip past defenses that would typically catch older, static versions of the stealer. Users must remain vigilant against this evolving danger.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

RenEngine Loader Bypasses Security Controls via Stealth

Next Post

APT-Q-27 Stealth Attack on Corporate Targeting Environments

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us