MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

A sophisticated macOS malware called MacSync has emerged as a dangerous new threat targeting cryptocurrency users through deceptive social engineering tactics.

The infostealer operates as an affordable Malware-as-a-Service tool designed to harvest sensitive data from macOS systems by convincing victims to paste a single command into their Terminal application.

Security researchers discovered MacSync while investigating phishing infrastructure mimicking Microsoft login pages.

The attack redirects users to a fake cloud storage installer page that displays step-by-step instructions for completing an installation using Terminal.

Fake download page (Source - CloudSEK)
Fake download page (Source – CloudSEK)

The malware represents an evolution of the earlier Mac.c stealer and has gained popularity among cybercriminals due to its low price point and modular design focused on cryptocurrency data theft.

The infection process exploits user trust in standard macOS installation workflows. Victims encounter a convincing landing page styled to resemble legitimate software, complete with reassuring language and a “Verified Publisher” badge.

google

A simple one-liner command copied to the clipboard triggers the entire compromise, completely bypassing macOS security protections like Gatekeeper and code notarization checks that would block traditional application packages.

Short Zsh script (Source - CloudSEK)
Short Zsh script (Source – CloudSEK)

CloudSEK analysts identified and analyzed the complete infection chain, discovering MacSync’s multi-stage attack mechanism that operates entirely through scripts rather than compiled binaries.

The malware first downloads a daemonized Zsh loader that detaches from the Terminal session and executes silently in the background. This loader then fetches and runs a remote AppleScript payload containing the core data-stealing functionality.

The Infection Mechanism and Data Harvesting Strategy

MacSync’s primary objective focuses on extracting cryptocurrency-related data through a highly targeted approach.

Once executed, the malware displays fake system dialogs repeatedly demanding the victim’s login password under the pretense of system verification.

This social engineering tactic proves remarkably effective because persistent dialogs eventually wear down user resistance.

After obtaining the password, MacSync systematically harvests browser profiles from Chrome, Brave, Edge, Opera, and other Chromium-based browsers, extracting stored passwords and authentication cookies.

The infostealer specifically targets dozens of cryptocurrency wallet browser extensions by identifying their installation directories and copying wallet seed phrases and private keys. Desktop wallet applications like Exodus, Electrum, and Bitcoin Core receive similar treatment.

Error Introduction (Source - CloudSEK)
Error Introduction (Source – CloudSEK)

The malware additionally steals SSH keys, AWS credentials, Keychain databases, and Apple Notes containing sensitive information.

To maintain long-term access, MacSync conditionally trojanizes hardware wallet applications like Ledger and Trezor when detected on infected systems.

MacSync Infection Chain (Source - CloudSEK)
MacSync Infection Chain (Source – CloudSEK)

The malware overwrites critical application components and replaces legitimate software with malicious versions that display convincing phishing wizards capturing PINs and recovery phrases weeks or months after initial infection.

The supporting infrastructure utilizes at least eight rotating C2 domains following consistent naming patterns, with multiple variant lure pages indicating active campaign evolution.

This infrastructure reuse and modular design demonstrate that MacSync represents an ongoing, scalable operation targeting the macOS cryptocurrency community through deceptive social engineering tactics.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link