MacStealer: Cross-Architecture macOS Info-Stealer Targeting Keychains, Wallets, and Browsers

MacStealer is a macOS-targeted info-stealer first discovered in early 2023, capable of extracting iCloud Keychain data, browser credentials, cookies, and crypto wallet information. It was among the first stealer malware tailored to support both Intel-based Macs and Apple’s M1/M2 chipsets, signaling growing attacker interest in Apple’s user base. MacStealer is distributed via phishing campaigns and trojanized app installers, luring users into running unsigned code under the guise of legitimate software.

Introduction to MacStealer

MacStealer takes aim at macOS users who are often less accustomed to dealing with malware, exploiting social engineering to gain execution and permissions. Once active, it scans for sensitive files, accesses browser storage and keychain content, and exfiltrates everything to a command-and-control server (C2). It reflects a rising trend of macOS stealers, which historically were rare compared to their Windows counterparts but are now increasingly common and dangerous.


1. How MacStealer Works

Infection Mechanism:
MacStealer is delivered through:

Payload Execution:
Once launched, MacStealer:


2. History and Notable Campaigns

Origin and Discovery:
MacStealer was first reported in March 2023 by researchers at Uptycs, who found it being advertised on dark web forums as a paid stealer tool for macOS attackers. It was among the first post-M1 malware families to explicitly support both Intel and ARM-based Macs.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing MacStealer Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing MacStealer

Indicators of Compromise (IoCs):

Removal Steps:

  1. Delete any unrecognized apps or installer files from the system
  2. Use malware scanners to detect and quarantine malicious processes
  3. Check login items, LaunchAgents, and LaunchDaemons for persistence
  4. Reset browser credentials and Keychain passwords
  5. Change all accounts accessed on the compromised system

Professional Help:
Users concerned about wallet theft, credential exposure, or system integrity should consult a macOS forensic specialist or use digital security services with expertise in stealer malware.


7. Response to a MacStealer Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
MacStealer facilitates the theft of sensitive personal data, triggering privacy and breach disclosure laws in many jurisdictions. Distributing or using this malware can lead to criminal prosecution under cybercrime statutes.

Ethical Considerations:
Stealer malware like MacStealer is designed solely for theft — there is no ethical justification for its creation or use. It contributes to rising rates of fraud, account compromise, and personal data exploitation.


9. Resources and References


10. FAQs about MacStealer

Q: What is MacStealer malware?
A macOS stealer that targets Keychain data, browser credentials, and crypto wallets.

Q: How does it spread?
Through fake app installers, pirated software, and phishing campaigns targeting Mac users.

Q: Can it bypass Gatekeeper?
Not automatically — it relies on users disabling protections and running unsigned apps.

Q: What data does it steal?
Passwords, cookies, autofill data, crypto wallet info, and system metadata.


11. Conclusion

MacStealer is part of a new wave of malware proving that macOS is no longer immune to info-stealing threats. It exploits user behavior—especially sideloading and poor permission hygiene—to steal valuable data with minimal user awareness. As macOS threats grow more capable, basic cybersecurity practices and awareness are now essential for Apple users, not optional.

 

 

« Back to the Virus Information Library

« Back to the Security Center