Wednesday, April 16, 2025
Homecyber securityPassword Stealing Malware Attacking macOS Users Increasing Rapidly

Password Stealing Malware Attacking macOS Users Increasing Rapidly

Published on

SIEM as a Service

Follow Us on Google News

In a concerning trend, macOS users are facing an unprecedented rise in password-stealing malware attacks.

Recent cybersecurity reports reveal a 101% surge in macOS infostealers during the latter half of 2024, marking these threats as the most significant category of new malware targeting Apple devices.

Infostealers such as Atomic Stealer, Poseidon Stealer, and Cthulhu Stealer are at the forefront of this wave, exploiting macOS vulnerabilities to siphon sensitive data like passwords, financial credentials, and cryptocurrency wallets.

- Advertisement - Google News

Distribution Methods

These malware strains leverage sophisticated techniques to infiltrate systems.

A common tactic involves exploiting AppleScript, a scripting framework native to macOS, to execute malicious operations while mimicking legitimate system prompts.

This method allows attackers to deceive users into entering credentials or disabling security controls.

For instance, Poseidon Stealer and Cthulhu Stealer often disguise themselves as popular applications like CleanMyMac or Adobe tools.

macOS Users
Cthulhu Stealer fake dialog boxes attempt to steal login credentials.

Distributed via malicious ads, phishing websites, and Trojanized installers, these threats bypass macOS’s Gatekeeper protections by tricking users into granting explicit permissions.

Atomic Stealer, one of the most prevalent infostealers, is sold as malware-as-a-service (MaaS) on underground forums.

Initially written in Go and later updated with C++ variants, it targets browser data, instant messaging apps like Telegram, and cryptocurrency wallets.

Similarly, Poseidon Stealer employs encoded AppleScript files to harvest user credentials and browser cookies, while Cthulhu Stealer compresses stolen data into ZIP archives for exfiltration to command-and-control servers.

macOS Users
Example of a malicious installer that delivers Poseidon Stealer.

Impact on Users and Organizations

By exfiltrating sensitive credentials and financial records, infostealers not only compromise individual privacy but also expose organizations to data breaches, financial losses, and reputational damage.

According to Palo Alto Networks, the growing popularity of macOS in corporate environments has amplified its appeal as a target for cybercriminals.

Despite Apple’s robust security measures like XProtect and sandboxing, these threats underscore the reality that no operating system is immune to sophisticated cyberattacks.

To counter this escalating threat landscape, cybersecurity experts recommend adopting a multi-layered defense strategy.

Users should download software exclusively from trusted sources and remain vigilant against unsolicited installation prompts.

Organizations are advised to deploy advanced detection tools capable of identifying anomalous file access and malicious AppleScript executions.

As macOS continues to gain market share globally, the need for heightened awareness and proactive security measures has never been more critical.

Cybercriminals are evolving their tactics rapidly, making it imperative for users and businesses alike to stay ahead of emerging threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...