Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/Threats/MonetaStealer AI Malware Actively Attacks macOS Users
Threats

MonetaStealer AI Malware Actively Attacks macOS Users

A new information-stealing malware, MonetaStealer, is actively targeting macOS users. It employs deceptive file disguises and social engineering tactics to compromise systems. Security researchers at...

Sarah simpson
Sarah simpson
January 15, 2026 3 Min Read
3 0

A new information-stealing malware, MonetaStealer, is actively targeting macOS users. It employs deceptive file disguises and social engineering tactics to compromise systems.

Security researchers at Iru first identified this threat on January 6, 2026, when they found a suspicious Mach-O binary masquerading as a Windows executable file named Portfolio_Review.exe.

The malware represents a growing concern for Mac users, especially those in professional industries who frequently receive portfolio files from potential candidates or collaborators.

MonetaStealer is designed to extract sensitive information from infected macOS systems, including browser passwords, cryptocurrency wallet data, Wi-Fi credentials, SSH keys, and financial documents.

The malware contains code that specifically checks for macOS systems using the verification if sys.platform != 'darwin', ensuring it only executes on Apple devices.

What makes this threat particularly interesting is its heavy reliance on code generated through machine learning tools, which researchers believe indicates the malware is still in early development phases.

Despite its incomplete nature, MonetaStealer maintains a zero-detection rate on VirusTotal at the time of discovery, making it invisible to most security solutions.

The Sequence analysts identified portfolio_app.pyc as the main payload hidden within the PyInstaller-compiled binary.

This Python-based malware embeds its malicious logic within a compressed CArchive structure that bypasses basic static file scanners.

Decompilation of the code revealed Russian-language comments and no obfuscation, suggesting the developer prioritized functionality over stealth.

Keychain Password Prompt (Source - The Sequence)
Keychain Password Prompt (Source – The Sequence)

The malware displays a banner reading “PROFESSIONAL MACOS STEALER v2.0” during execution, along with print statements that track its progress through various data theft modules.

Chrome Browser Data Theft

MonetaStealer specifically targets Google Chrome browser data by creating temporary copies of SQLite databases to bypass file locks.

The malware executes the command security find-generic-password -w -a "Chrome" to retrieve the Base64 master key stored in the macOS Keychain, which is required for decrypting saved passwords.

This operation triggers a system prompt requesting the user’s keychain password, which could alert observant victims. Once access is granted, the malware queries login credentials, session cookies, and browsing history through targeted SQL commands.

The cookie theft module applies keyword filtering to identify high-value targets by searching for terms like “bank,” “crypto,” “exchange,” and “paypal” within cookie host names.

This targeted approach allows the malware to prioritize financial and cryptocurrency platform sessions. The following code demonstrates how MonetaStealer processes stolen cookies:

print('[+] Stealing Chrome cookies...')
try:
    host, name, path, encrypted_value = row
    if any((keyword in host.lower() for keyword in ['bank', 'crypto',
'exchange', 'paypal'])) and self.stolen_data['browser']['cookies'].append({'host':
host, 'name': name, 'path': path}):
        pass
    conn.close()
except Exception as e:
    print (f' X Error: {e}')

The malware also harvests browsing history by extracting URLs, page titles, and visit frequencies from Chrome’s History database.

This information can reveal user interests, frequently visited services, and potential additional targets for follow-up attacks.

All collected browser data is structured into the malware’s internal storage dictionary for later exfiltration through a Telegram bot infrastructure identified as “b746_mac_collector_bot” with the bot ID 8384579537.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Turla’s Kazuar v3 Loader Leverages Event Tracing for Windows and

Next Post

Windows Remote Assistance Flaw Lets Attackers Bypass Security

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us