Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/MacSync macOS Infostealer Uses ClickFix Attack via
Threats

MacSync macOS Infostealer Uses ClickFix Attack via

MacSync, a sophisticated macOS malware, now poses a significant threat to cryptocurrency users, leveraging deceptive social engineering tactics. The infostealer operates as an affordable...

Jennifer sherman
Jennifer sherman
January 23, 2026 3 Min Read
0 0

MacSync, a sophisticated macOS malware, now poses a significant threat to cryptocurrency users, leveraging deceptive social engineering tactics.

The infostealer operates as an affordable Malware-as-a-Service tool designed to harvest sensitive data from macOS systems by convincing victims to paste a single command into their Terminal application.

Security researchers discovered MacSync while investigating phishing infrastructure mimicking Microsoft login pages.

The attack redirects users to a fake cloud storage installer page that displays step-by-step instructions for completing an installation using Terminal.

Fake download page (Source - CloudSEK)
Fake download page (Source – CloudSEK)

The malware represents an evolution of the earlier Mac.c stealer and has gained popularity among cybercriminals due to its low price point and modular design focused on cryptocurrency data theft.

The infection process exploits user trust in standard macOS installation workflows. Victims encounter a convincing landing page styled to resemble legitimate software, complete with reassuring language and a “Verified Publisher” badge.

A simple one-liner command copied to the clipboard triggers the entire compromise, completely bypassing macOS security protections like Gatekeeper and code notarization checks that would block traditional application packages.

Short Zsh script (Source - CloudSEK)
Short Zsh script (Source – CloudSEK)

CloudSEK analysts identified and analyzed the complete infection chain, discovering MacSync’s multi-stage attack mechanism that operates entirely through scripts rather than compiled binaries.

The malware first downloads a daemonized Zsh loader that detaches from the Terminal session and executes silently in the background. This loader then fetches and runs a remote AppleScript payload containing the core data-stealing functionality.

The Infection Mechanism and Data Harvesting Strategy

MacSync’s primary objective focuses on extracting cryptocurrency-related data through a highly targeted approach.

Once executed, the malware displays fake system dialogs repeatedly demanding the victim’s login password under the pretense of system verification.

This social engineering tactic proves remarkably effective because persistent dialogs eventually wear down user resistance.

After obtaining the password, MacSync systematically harvests browser profiles from Chrome, Brave, Edge, Opera, and other Chromium-based browsers, extracting stored passwords and authentication cookies.

The infostealer specifically targets dozens of cryptocurrency wallet browser extensions by identifying their installation directories and copying wallet seed phrases and private keys. Desktop wallet applications like Exodus, Electrum, and Bitcoin Core receive similar treatment.

Error Introduction (Source - CloudSEK)
Error Introduction (Source – CloudSEK)

The malware additionally steals SSH keys, AWS credentials, Keychain databases, and Apple Notes containing sensitive information.

To maintain long-term access, MacSync conditionally trojanizes hardware wallet applications like Ledger and Trezor when detected on infected systems.

MacSync Infection Chain (Source - CloudSEK)
MacSync Infection Chain (Source – CloudSEK)

The malware overwrites critical application components and replaces legitimate software with malicious versions that display convincing phishing wizards capturing PINs and recovery phrases weeks or months after initial infection.

The supporting infrastructure utilizes at least eight rotating C2 domains following consistent naming patterns, with multiple variant lure pages indicating active campaign evolution.

This infrastructure reuse and modular design demonstrate that MacSync represents an ongoing, scalable operation targeting the macOS cryptocurrency community through deceptive social engineering tactics.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

GenAI Allows Hackers to Maliciously Alter Clean Change Loaded

Next Post

Discover the Top 10 Best Data Security Companies for

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us