TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
MacStealer malware targets Mac users and cryptocurrency wallets

MacStealer malware targets Mac users and cryptocurrency wallets

Emre ÇıtakbyEmre Çıtak
29 March 2023
in Security, Tech
Reading Time: 3 mins read
Share on FacebookShare on Twitter

A recently discovered info-stealing malware, known as MacStealer malware, has been targeting Mac users, posing a significant risk to their stored iCloud KeyChain credentials, web browser data, cryptocurrency wallets, and potentially sensitive files.

This dangerous malware has been identified by the Uptycs threat research team and is currently being sold as a malware-as-a-service (MaaS) on the dark web. Purchasers can obtain pre-made builds for $100, enabling them to easily spread the malware in their campaigns. And since you can now synchronize your iCloud keychain passwords with Google Chrome, using other browsers won’t help to fight against the MacStealer malware too.

MacStealer malware
MacStealer malware targets users’ stored iCloud KeyChain credentials, web browser data and cryptocurrency wallets

MacStealer is compatible with macOS Catalina (10.15) and all subsequent versions, up to the most recent Apple OS, Ventura (13.2). This stealthy malware was first spotted by Uptycs analysts on a dark web hacking forum, where the developer has been promoting it since early in the month.

Despite its early beta development stage, MacStealer does not come with panels or builders. Instead, the developer sells pre-built DMG payloads capable of infecting macOS Catalina, Big Sur, Monterey, and Ventura.

The MacStealer Malware menace

The malware creator justifies the relatively low price of $100 for MacStealer malware by citing the lack of a builder and panel. However, they promise to add more advanced features soon. According to the developer, MacStealer can extract the following data from compromised systems:

  • Account passwords, cookies, and credit card information from Firefox, Chrome, and Brave
  • A range of file types, including TXT, DOC, DOCX, PDF, XLS, XLSX, PPT, PPTX, JPG, PNG, CSV, BMP, MP3, ZIP, RAR, PY, and DB files
  • The Keychain database (login.keychain-db) in base64 encoded form
  • System information and Keychain password details
  • Coinomi, Exodus, MetaMask, Phantom, Tron, Martian Wallet, Trust wallet, Keplr Wallet, and Binance cryptocurrency wallets

The Keychain database is a secure storage system in macOS, designed to hold users’ passwords, private keys, and certificates, encrypting them with their login password. This feature enables the automatic entry of login credentials on web pages and apps.

MacStealer malware
MacStealer malware is available at DarkWeb only for $100

How does MacStealer malware operate?

MacStealer is distributed as an unsigned DMG file, posing as an innocuous file that victims are tricked into executing on their macOS systems. Once executed, a fake password prompt is presented to the victim, which, when entered, allows the malware to collect passwords from the compromised machine.

Subsequently, the malware gathers all the data mentioned above, stores it in a ZIP file, and sends the stolen information to remote command and control servers for later retrieval by the threat actor.

Simultaneously, MacStealer malware sends basic information to a pre-configured Telegram channel, allowing the operator to receive quick notifications when new data is stolen and download the ZIP file. Although most MaaS operations target Windows users, macOS is not immune to such threats. Mac users should remain vigilant and avoid downloading files from untrustworthy websites to protect themselves from this emerging threat.

The rising usage of Mac malwares

Last month, security researcher iamdeadlyz discovered another Mac information-stealing malware distributed in a phishing campaign aimed at players of ‘The Sandbox’ blockchain game. Similar to MacStealer, this information stealer also targeted credentials saved in browsers and cryptocurrency wallets, including Exodus, Phantom, Atomic, Electrum, and MetaMask.

With the increasing value of cryptocurrencies and the growing popularity of Mac systems, it is expected that more malware developers will target macOS users in their quest to steal valuable cryptocurrency wallets.

MacStealer malware
The use of Mac malware is on the rise.

As a result, Mac users must remain cautious, update their systems regularly, and use robust security measures to protect their devices and sensitive information from malicious actors like those behind MacStealer malware.

In conclusion, the emergence of the MacStealer malware highlights the growing threat landscape for Mac users. Cybercriminals are increasingly targeting macOS devices in search of valuable data and cryptocurrency wallets. As the MacStealer malware continues to evolve and potentially gain more advanced features, it is crucial for Mac users to remain vigilant and prioritize their digital security.

Tags: featuredmalware
ShareTweet
Emre Çıtak

Emre Çıtak

Emre’s love for animals made him a veterinarian, and his passion for technology made him an editor. Making new discoveries in the field of editorial and journalism, Emre enjoys conveying information to a wide audience, which has always been a dream for him.

Related Posts

Substack launches TV app for Apple and Google platforms

Substack launches TV app for Apple and Google platforms

23 January 2026
JBL enters the practice amp market with AI-driven Stem separation technology

JBL enters the practice amp market with AI-driven Stem separation technology

23 January 2026
Google Search adds “Personal Intelligence” to AI Mode

Google Search adds “Personal Intelligence” to AI Mode

23 January 2026
Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

22 January 2026

LATEST

OpenAI appoints Barret Zoph to lead enterprise sales

Vimeo begins global staff reductions following Bending Spoons acquisition

LiveKit reaches unicorn status with $100 million in new funding

Substack launches TV app for Apple and Google platforms

Oracle and Silver Lake lead consortium in landmark TikTok US deal

JBL enters the practice amp market with AI-driven Stem separation technology

Google Search adds “Personal Intelligence” to AI Mode

Amazon set to launch second wave of corporate layoffs next week

Blue Origin’s New Glenn-3 mission to deploy AST SpaceMobile’s BlueBird 7

Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska