ShiftDelete.Net Global

Mac users beware: Your credit card info might be stolen!

Ana sayfa / News

A new type of malware is spreading in the Mac domain. MacStealer can access many important files, such as the iCloud Keychain database, credit card data, and cryptocurrency wallet information.

Despite their reputation for security, Apple-signed computers can sometimes fall victim to malicious software. A recently discovered new malicious software serves as proof of this. Mac users should be cautious when opening applications from unknown sources.

MacStealer poses a significant threat

MacStealer, a malicious software, was discovered by a threat research company called Uptycs. With this malicious software, we can say that the iCloud Keychain database, credit card data, cryptocurrency wallet credentials, browser identification information, documents, and many other personal data are at risk.

It is clear that users are at risk if this virus software settles on Mac computers. MacStealer begins its attacks using an installer file called weed.dmg, which, when opened, initiates a fake password prompt that collects your login credentials and uses them to access your sensitive information, which is then compressed and sent to a hacker-controlled server. The stolen data is later published on a private Telegram channel.

A new security vulnerability in Tesla

Defective Tesla app enables access to the doors of all Tesla vehicles.

Fortunately, MacStealer cannot extract passwords stored in the Mac computers’ iCloud Keychain database. The reason is attributed to iCloud Keychain encrypting all stored data. However, the attackers have not given up on their targets yet.

The individuals who developed the MacStealer system plan to access more data with future versions. The hackers claim that, in future versions of the application, they will be able to empty cryptocurrency wallets and create a user control panel. The developers are currently selling the MacStealer software for a price of 100 dollars.

To protect against MacStealer and other similar Mac malicious software, users need to keep their devices updated. Additionally, installing applications only from trusted sources is another important point.  

Yorum Ekleyin