Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Seedworm APT Abuses Fortemedia & SentinelOne Signed Binaries
May 14, 2026
Critical Windows DNS Client Flaw Allows Remote Code Execution
May 14, 2026
Home/Threats/macOS Infostealer Attacks Abuse Python & Trusted Platforms
Threats

macOS Infostealer Attacks Abuse Python & Trusted Platforms

A notable expansion in infostealer campaigns is underway, as threat actors increasingly target macOS users after historically concentrating on Windows environments. These malicious operations exploit...

David kimber
David kimber
February 3, 2026 2 Min Read
2 0

A notable expansion in infostealer campaigns is underway, as threat actors increasingly target macOS users after historically concentrating on Windows environments. These malicious operations exploit Python and trusted platforms to compromise new victims.

Recent attacks show a clear shift: threat actors are abusing online ads, fake apps, and familiar tools to quietly steal credentials, session cookies, and cryptocurrency data from Mac users.

Cross‑platform Python stealers and macOS‑specific families like DigitStealer, MacSync, and Atomic macOS Stealer (AMOS) are at the center of this surge, turning everyday browsing and software installs into high‑risk events for consumers and businesses alike.

These campaigns rely heavily on social engineering to bypass users’ trust.

Malvertising and search‑engine‑poisoned links lead to fake installers or “system fix” utilities that appear legitimate, often wrapped in DMG images or seemingly harmless scripts.

Once executed, the payloads quickly move to harvest browser passwords, keychain entries, crypto wallets, and developer secrets.

For organizations, the theft of cloud credentials and source‑code access can open the door to deeper compromise, including supply chain attacks and ransomware.

Microsoft researchers noted that recent infostealer waves blend macOS‑native techniques with flexible Python tooling to operate across multiple environments.

On macOS, the malware leans on built‑in utilities and AppleScript automation to keep a low profile, while Python stealers are delivered widely through phishing emails and booby‑trapped attachments in corporate networks.

At the same time, attackers are weaponizing trusted platforms such as WhatsApp and fake PDF tools to push stealer payloads, making malicious traffic harder to distinguish from normal activity.

Infection mechanism: from lure to silent data theft

The infection chain typically begins with a lure that looks routine to the victim.

For macOS campaigns, users are steered to spoofed download pages for tools such as DynamicLake or fake AI utilities, or tricked into copy‑pasting Terminal commands that supposedly fix browser or system issues.

When the user runs the installer or command, the malware uses native components like curl, base64 decoding, and gunzip to fetch and unpack additional payloads directly into memory, avoiding obvious file drops.

Scripts executed via osascript or JavaScript for Automation then enumerate the system, query browsers and keychains, and stage stolen data in temporary archives.

Finally, the infostealer exfiltrates these archives to attacker‑controlled domains or command‑and‑control servers using HTTPS POST requests, often over newly registered or low‑reputation infrastructure, completing the compromise with few visible signs to the user.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingransomwareThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Exploit React Native Metro Server to Attack Developers

Next Post

Fake Dropbox Phishing Attack Steals User Login Credentials

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Gentlemen RaaS Exploits Fortinet & Leverages Cisco
May 14, 2026
Windows BitLocker 0-Day Allows Vulnerability Enables
May 14, 2026
SOCs & MSSPs Prevent Phishing Missed Incidents Email
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us