"New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords"

A new information-stealing malware has targeted Apple's macOS operating system in an effort to steal sensitive data from infected devices. MacStealer is the latest example of malware distribution that involves Telegram as a command-and-control (C2) platform for data exfiltration. It mainly impacts devices running macOS Catalina and later on M1 and M2 CPUs. MacStealer is capable of stealing documents, browser cookies, and login credentials, according to a new report by Uptycs researchers. It was first advertised on online hacking forums at the beginning of the month, and the malware authors plan to add functionality to capture data from Apple's Safari browser and the Notes app. MacStealer is currently designed to harvest iCloud Keychain data, passwords, and credit card details from browsers such as Google Chrome, Mozilla Firefox, and Brave. It also supports the extraction of Microsoft Office files, images, archives, and Python scripts. This article continues to discuss the new information-stealing malware MacStealer. 

THN reports "New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords"

Submitted by Anonymous on