Home » News » macOS Infostealer: Mac.c Rivals AMOS Malware Threat

macOS Infostealer: Mac.c Rivals AMOS Malware Threat

by Sophie Lin - Technology Editor

The Crowdsourced Malware Era: How a New macOS Stealer is Changing the Game

Over 28% of all malware detected on Macs is now an infostealer – a figure that’s rapidly climbing as cybercriminals discover the lucrative potential of targeting Apple’s growing user base. But it’s not just the volume of these threats that’s changing; it’s how they’re being built and distributed. A new player, operating under the alias “mentalpositive” and distributing the “Mac.c” infostealer, is pioneering a shockingly transparent, almost collaborative approach to malware development, and it’s a trend that could dramatically reshape the macOS security landscape.

From Atomic macOS Stealer to Mac.c: The Rise of Infostealers-as-a-Service

For those following cybersecurity news, the name Atomic macOS Stealer (AMOS) is likely familiar. AMOS quickly became the dominant infostealer on macOS in 2023, known for its ability to quietly siphon sensitive data from infected systems. Now, Mac.c is emerging as a serious competitor, and its creator is doing things very differently. Unlike the secretive nature typically associated with malware development, mentalpositive actively solicits feedback on darknet forums, shares progress updates, and even offers a web-based interface for customers to customize and manage their own versions of the stealer.

This “Malware-as-a-Service” (MaaS) model isn’t entirely new, but its application to the macOS ecosystem, coupled with mentalpositive’s open approach, is raising eyebrows. Affiliates, even those with limited technical skills, can essentially rent Mac.c and deploy it against targets. This lowers the barrier to entry for cybercrime and accelerates the spread of these threats. The developer even offers subscriptions for updates, with early ads showing pricing around $1,500 per month – a testament to the perceived value of this service.

Technical Innovations: Speed, Stealth, and Trezor Targeting

Mac.c isn’t just notable for its distribution model; it’s also technically sophisticated. It shares code similarities with AMOS and Rodrigo4, but has been optimized for faster data exfiltration and reduced detection rates. By trimming down the malware’s size, mentalpositive ensures quicker downloads and fewer detectable artifacts. The increasing number of command-and-control URLs suggests a robust and scalable infrastructure.

Perhaps most concerning is the addition of a module specifically designed to phish Trezor seed phrases. This targets users of hardware wallets, potentially leading to the theft of cryptocurrency. The ability to generate custom builds, bypassing Apple’s XProtect security feature, further enhances the stealer’s effectiveness. This demonstrates a clear understanding of macOS security mechanisms and a willingness to actively circumvent them.

Why macOS is Becoming a Prime Target

The increasing focus on macOS isn’t accidental. Apple’s market share has been steadily growing, with Mac shipments outpacing PC makers in the US. As of late 2023, Apple held around 17.1% of the overall computer market (excluding tablets), according to Canalys. This growth represents a significant pool of potential victims for cybercriminals.

Historically, macOS has benefited from a perception of being more secure than Windows. However, this perception is increasingly outdated. The growing user base, combined with the inherent complexities of the macOS operating system, creates vulnerabilities that attackers are eager to exploit. Infostealers, in particular, are attractive because they offer a relatively quick and reliable path to financial gain, often bypassing the lengthy payout cycles associated with ransomware.

The Role of Accessibility and Low Barriers to Entry

The rise of MaaS models like the one employed by mentalpositive is a key driver of this trend. These services democratize access to sophisticated malware, allowing individuals with limited technical expertise to participate in cybercrime. The fast payouts and relatively low risk associated with infostealers make them particularly appealing to aspiring cybercriminals.

Protecting Yourself in an Evolving Threat Landscape

While Apple continues to enhance macOS security with features like Gatekeeper and XProtect, these defenses aren’t foolproof. Users must remain vigilant and adopt proactive security measures. The basics still apply: exercise caution when installing software from outside the Mac App Store, verify links before clicking, use strong and unique passwords, enable two-factor authentication (preferably using an authenticator app rather than SMS), and keep your software up to date.

However, given the sophistication of modern infostealers, a layered security approach is crucial. Consider using a reputable endpoint detection and response (EDR) solution, and be particularly cautious about granting permissions to applications. Staying informed about the latest threats and security best practices is also essential. For more information on the evolving threat landscape, consider exploring resources from organizations like the Cybersecurity and Infrastructure Security Agency (CISA).

The emergence of Mac.c and the rise of crowdsourced malware represent a significant shift in the macOS security landscape. The transparency and collaborative nature of this new approach are deeply unsettling, and it’s a trend that security professionals will be watching closely. The future of macOS security will depend on a combination of robust system defenses and informed, vigilant users. What proactive steps will you take to protect your data in this evolving threat environment?

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.