Follow Us

Macbook Crypto Users Targeted By Advanced Malware Attack

Share on facebook
Share on twitter
Share on linkedin


Macbook Crypto Users Targeted By Advanced Malware Attack
Share on facebook
Share on twitter
Share on linkedin

A recently discovered malware campaign aims at cryptocurrency users via infected applications covertly distributed to Macbook owners. Cybersecurity researchers at Kaspersky Lab revealed the sophisticated multi-stage attack ultimately seeks to drain victims’ crypto wallets after compromising their devices.

Attack Leverages Cracked Software Appeal

According to Kaspersky’s findings, attackers repackage infected versions of legitimate applications using the Mac PKG file format. The malware-carrying files spread through software piracy channels to reach users actively seeking cracked apps.

By bundling the malicious code with desirable premium software offered free of charge, the hackers distribute their malware while avoiding detection.

After victims install what they believe are merely pirated programs, the embedded attack sequence activates stealthily in the background.

Malware Covertly Gains Admin Access

The initial malware execution displays an installation window with instructions for where to copy the “cracked” app and run an included component called “Activator” to complete the setup.

Entering an admin password into Activator grants the malware elevated privileges necessary to breach the system. It then checks for Python 3, installing it if not already present to enable more flexible system manipulation via Python scripting.

With admin access secured, the attack enables communication to a remote command and control server controlled by the hackers. It also begins extracting sensitive system information to send to the server, including:

  • Mac OS version details
  • User directory listings
  • Installed application data
  • CPU specifications
  • External IP address

This exposes victims’ files, installed software vulnerabilities, machine configurations, and network data to equip attackers with extensive machine and user intelligence.

Crypto Wallet Apps Explicitly Targeted

While monitoring active campaign tactics, Kaspersky observed the attackers’ malware update itself over time rather than issue specific commands, indicating an evolving threat.

More alarmingly, analysts confirmed coding intended to replace legitimate installations of widely-used crypto asset apps Exodus Wallet and Bitcoin-Qt with compromised versions.

The wallet-replacing malware contains tailored mechanisms to capture password entry attempts and recovery passphrases or substitute the hackers’ wallet address to redirect transactions.

So, beyond exposing user files and system information to aid remote data theft or broader device intrusion, the attackers directly facilitate cryptocurrency theft. This highlights crypto holders as primary targets of the social engineering-enhanced malware operation.

By potentially draining victims’ virtual asset accounts and compromising sensitive personal data, the campaign’s consequences especially threaten Mac-using crypto community members.

Ingenious Attack Tactics on Display

The extensive attack chain showcases the rising sophistication of malware distributors in tailoring campaigns to maximize effectiveness. Leveraging trusted software brands and platforms to lower target suspicion combined with strategic crypto asset theft exhibits notable tactical ingenuity.

According to Kaspersky researchers, the use of encrypted DNS server traffic to conceal the malware’s outgoing communications further demonstrates the attackers’ cunning tradecraft.

As cybercrime perpetrators continue evolving attack creativity and refunding methods to snare victims, malware threats seem poised to advance in scope and impact. Heedful awareness of emerging tactic indicators thus becomes essential self-defense for crypto adopters and digitally connected netizens in the modern age.


The recent malware attack targeting Mac-using cryptocurrency enthusiasts is a stark reminder for everyone to stay vigilant online. The attackers used clever tactics like trusted platforms, enticing free software, and crypto wallet replacements. With cyber threats evolving, all internet users must be aware and take protective measures. 

Cryptocurrency holders, in particular, should be proactive in securing their assets to prevent potential losses. Stay informed about the latest threats and follow expert advice to strengthen your defenses in the ever-changing online security landscape.

Leave a Reply

Your email address will not be published. Required fields are marked *

Download our App for getting faster updates at your fingertips.


We Recommend

Top Rated Cryptocurrency Exchange

Update Required Flash plugin