![]() MacStealer then collects the data, compresses it into a ZIP file, forwards it to the threat actor.Īpple has not yet issued a statement about the malware, and it is uncertain whether MacStealer has been recorded in the CVE.report database that monitors vulnerabilities and exposures. The malware spreads via a “weed.dmg” executable file, which, when launched, presents a fake password prompt to deceive users into providing their passwords. Its developer has revealed that the malware is in the initial stages of development, with plans to introduce more sophisticated features in the future. Offered as a malware-as-a-service (MaaS) on dark web hacking forums, MacStealer’s premade builds are being sold for $100 each. MacStealer can access account passwords, cookies, and credit card information from Firefox, Chrome, and Brave browsers and retrieve multiple file types, such as TXT, DOC, JPG, and ZIP files. The Uptycs threat research team, which discovered MacStealer, has confirmed its compatibility with macOS Catalina (10.15) through to Apple’s latest OS, Ventura (13.2). A recently identified information-stealing malware, MacStealer, is targeting macOS users, compromising their credentials in iCloud Keychain, web browsers, and cryptocurrency wallets, as well as gaining access to various sensitive files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |