PULSE NAME
Stealer Campaign Impacting SLTT macOS Users
WHITE AlienVault 2026-04-09 Modified: 2026-04-09
17
IOCs
MEDIUM VOLUME
MacSync Stealer is a macOS infostealer operating as Malware-as-a-Service (MaaS), distributed through SEO poisoning and fake ClickFix CAPTCHAs. The campaign has evolved through three iterations since November 2025, shifting from fake download sites to malicious ChatGPT conversations and finally to sophisticated shell-based loaders with dynamic AppleScript payloads. Threat actors use Google-sponsored search results to redirect victims to fake CAPTCHA pages that trick users into executing malicious terminal commands. The stealer targets browser credentials, cryptocurrency wallets, SSH keys, cloud provider credentials, and Keychain data. A critical capability includes trojanizing Ledger hardware wallet applications to capture seed phrases. The February 2026 campaign generated over 18,000 clicks in three days, with Russian-language comments suggesting operators work within a Russian-speaking ecosystem. The malware employs API key-gated C2 infrastructure and in-memory execution for evasion.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
MacSync Stealer
Indicators of Compromise (3 / 17 total)
All FileHash-MD5 FileHash-SHA256 URL domain hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 866993e9950250ac2ce8c3b4c6a8bd39285e0fafd93860f235a3b0370f160dd1 2026-04-09
FileHash-SHA256 b2955c54eb0c047463993b379e015e737aabed37b456aeb0957cf84cdb0ed1f0 2026-04-09
FileHash-SHA256 c56a1b268f358d9fb4d6264932706b53a7347e2544bb5f26355b0c7fc1d299d8 2026-04-09