Microsoft Warns of macOS Infostealer Attacks Via Fake Ads

Microsoft warns of rising infostealer malware targeting macOS via fake ads and phishing schemes

  • Microsoft warned in February 2026 that information-stealing malware is aggressively targeting macOS systems through fake ads and installers.
  • Threat actors are using cross-platform languages like Python to deploy stealers such as PXA, Atomic macOS Stealer (AMOS), and Eternidade.
  • The infection chains start with malvertising and social engineering, leading to credential theft from browsers, financial accounts, and cryptocurrency wallets.

In February 2026, Microsoft‘s security team issued a stark warning that infostealer attacks are rapidly expanding to target Apple’s macOS environment. This strategic shift leverages social engineering and trusted platforms to deliver malicious payloads at scale.

- Advertisement -

Since late 2025, attackers have tricked users with “ClickFix” lures distributed via fake sites. Consequently, these sites promote disk image installers for popular tools like DynamicLake and AI applications.

The campaigns deploy malware families including Atomic macOS Stealer (AMOS), MacSync, and DigitStealer. These tools use native macOS utilities and automation to steal web credentials, iCloud Keychain data, and developer secrets.

Microsoft said Python-based stealers allow attackers to rapidly adapt and target diverse systems. These threats typically harvest login credentials, session cookies, and cryptocurrency wallet information.

One example is the PXA Stealer, linked to Vietnamese-speaking actors, which launched phishing campaigns in late 2025. The malware establishes persistence and uses Telegram for command-and-control communications.

- Advertisement -

Meanwhile, other threat groups have weaponized messaging apps like WhatsApp to distribute the Eternidade Stealer. This campaign, documented in November 2025, specifically targets financial and crypto accounts.

Further campaigns involve fake software like Crystal PDF, spread through search engine poisoning. These installers deploy a Windows-based stealer designed to silently collect browser data from Firefox and Chrome.

Organizations are advised to educate users on social engineering and malvertising risks. They must also monitor for suspicious terminal activity and network egress to newly registered domains.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

XRP’s 56% Price Plunge Sparks ‘Best Time to Buy’ Debate

Ripple's XRP hit a seven-year all-time high of $3.65 in July 2025 following its...

Dark Web Drug Market Operator Gets 30-Year Crypto Prison Sentence

Rui-Siang Lin was sentenced to 30 years in federal prison for operating the dark...

Dogecoin Rallies On Musk’s Moon Plan As Market Corrects

Dogecoin (DOGE) rallied 1.7% on Tuesday, February 4, 2026, following comments by Elon Musk...

BitMine’s Losses Are Plan, Not Flaw, Says Chairman Lee

BitMine Immersion defends its paper losses as an inevitable feature of its long-term Ethereum...

Bitcoin Ransom Note in Guthrie Kidnapping Probe

Investigators are treating the disappearance of Nancy Guthrie, mother of TV anchor Savannah Guthrie,...
- Advertisement -

Must Read

Top 5 Best Crypto Faucets To Earn Free Crypto This Year

QUICK LINKSWhat Are Crypto Faucets and How Do They Work?How Do Crypto Faucets Make Money?What to Expect: Realistic EarningsThe Best Crypto Faucets of 2025:...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!