![]() Experts claimed that the developers created the new malware by taking similar techniques from StormKitty. Hence, users face additional threats from many malicious entities in the cybercriminal landscape.įurthermore, another C#-based malware dubbed HookSpoofer has emerged recently. This new malware is another infostealer that has emerged in several months. Once a target runs this DMG file, it will open a fake password prompt that could collect the user’s password. What the researchers know is that the infostealer propagates as a DMG file. Unfortunately, researchers have yet to identify the exact process of how the threat actors deliver the MacStealer. The new malware could also enable its operators to harvest MS Office files, documents, images, and Python scripts. However, the current version of MacStealer could only exfiltrate iCloud Keychain data, passwords, and credit card information from well-known browsers, such as Mozilla Firefox, Brave, and Google Chrome. Researchers believe that the malware authors plan to add additional features to the MacStealer so it could harvest data from the Notes app and Apple’s Safari browser. Its authors asked about $100 as an initial payment for a monthly subscription. The malware developers first endorsed the MacStealer infostealer on online hacking forums. The MacStealer infostealer malware could siphon numerous credentials like other payloads that target non-macOS devices.Īccording to early investigations, the MacStealer malware could steal data, such as documents, browser cookies, and login credentials. ![]() Moreover, MacStealer could also run on M1 and M2 CPUs. ![]() ![]() This latest threat is a new malicious entity that utilises Telegram as a C2 platform to exfiltrate data.īased on reports, the most affected devices of this new infostealer are the macOS version Catalina. The new information-stealing malware, MacStealer, targets Apple’s macOS operating system to harvest information from infected devices. ![]()
0 Comments
Leave a Reply. |