Microsoft warns of a new wave of malware: Companies targeted by Python-based information stealers on macOS

Cybercriminals have refined their methods, relying on platform independence, social manipulation, and targeted attacks on corporate systems. A recent warning from Microsoft makes it clear that macOS is no longer safe territory. Python-based information thieves (infostealers) such as AMOS, MacSync, DigitStealer, and PXA Stealer use sophisticated deception tactics like fake advertising (malvertising) and bogus installers to steal passwords, access tokens, crypto wallets, and intellectual property on a massive scale.

This article analyzes why this trend toward a serious business threat, rather than a mere technical exception, should not be downplayed, from the perspective of IT security, industrial espionage, and industrial sabotage. Furthermore, we demonstrate how ProSec helps companies recognize, circumvent, and strategically manage this complex threat landscape.

Table of Contents

macOS, the new target: Perceived security vs. reality

Many companies rely on the myth that macOS is "more secure" than Windows. This assumption may be partly based on outdated threat models, but it is long obsolete in light of cross-platform malware. The reality is: Apple's operating system is attractive to attackers—especially in executive suites and among developers, where macOS is widespread and sensitive credentials are stored.

This is precisely where the new infostealers come in. Entire campaigns use stealth methods such as DMG installation files, AppleScript automation, and native macOS tools to gain unobtrusive access to:

  • Web browser passwords
  • iCloud Keychains
  • Developer secrets
  • Authentication token
  • Crypto wallets

to obtain — a combination that enables far more than just reading emails.

According to Microsoft, attackers use the Python programming language to quickly access multiple platforms and to make their malware modules modular and adaptable. They rely on low-cost, high-impact tactics such as phishing emails or fake Google Ads that impersonate legitimate tools like Dynamic Lake or AI applications.

A look behind the attack strategies: What are the technical and organizational aspects behind them?

A key element of current attack strategies is the buzzword "ClickFix." This is a method in which users are tricked into copying and pasting seemingly harmless lines of code into the terminal—for example, to "repair" an allegedly blocked installation script. This deception is particularly insidious because it directly exploits the victim's trust and doesn't require any actual vulnerabilities at the operating system or network level.

In combination with malvertising – the delivery of harmful advertising via supposedly trustworthy platforms like Google Ads – a chain of threats emerges that can catch even well-organized companies off guard. A paradigm shift has taken place here: from technical exploitation to the targeted psychological deception of employees.

A case in point: An IT project manager googles for a PDF editor for macOS and clicks on a Google ad. The linked page appears legitimate, the software seemingly familiar. However, the DMG package contains the infostealer, which silently extracts credential caches from Safari and Chrome and transmits them via POST request to an exfiltration target – often a Telegram bot or a Tor-based C&C system.

Economic crime on a new level: What is really at risk

The use of information stealers marks a significant shift in cybercrime: away from isolated data theft and towards industrialized, multi-victim data exfiltration. Companies face the potential loss of vital trade secrets, such as IP-specific code, prototypes, customer portals, developer certificates, or cloud access.

What is particularly threatening is that these are no longer just technical security breaches, but intrusions with far-reaching strategic consequences. A compromised developer account, for example, can undermine entire CI/CD chains – thus endangering not only the company itself, but also its customers.

The potential consequence: massive supply chain problems, loss of trust among partners – and, with regard to legal requirements such as NIS2 or DORA, also fines from regulatory authorities.

The limits of classic protective measures

The current wave of attacks makes it clear that classic measures such as antivirus programs, signature-based firewalls, or Endpoint Detection & Response (EDR) are increasingly losing their effectiveness. Why? Because many of the attackers' tools are "living off the land"—that is, they utilize functions provided by the operating system itself (e.g., AppleScript, Automator, CronJobs, or LaunchAgents).

Furthermore, social engineering often eliminates the initial technical exploit entirely. The security vulnerability lies at the end of the keyboard—with the user themselves.

Therefore, a rethink is needed in security strategies at the C-level: not reactive-technical, but proactive-structural.

How your organization should respond in a targeted manner

The good news: Companies can effectively reduce these risks — if they act wisely. The following measures are essential for a modern, resilient security culture:

  1. Raise awareness of social engineering: Train not only IT, but also marketing, HR and purchasing departments on modern deception campaigns such as ClickFix, fake captchas or SEO poisoning.
  2. Extend monitoring beyond endpoints: Observe terminal access, AppleScript activity, and unusual POST domains. Public indicators of compromise can be found, for example, at... in the MITRE ATT&CK framework.
  3. Implement Zero Trust – also on macOS: Ensure that macOS devices are part of your Zero Trust strategy. Device and user authentication must be tightly integrated.
  4. Implement cross-platform threat intelligence: A Windows-focused SOC (Security Operations Center) is blind to macOS. Focus on Recommendations such as those from the NIST Cybersecurity Framework.
  5.  Conduct Red Team / Blue Team exercises: Only through realistic attack simulations can you identify organizational weaknesses – while taking the human factor into account.

 
Link to the red teaming matrix

How ProSec strengthens companies in this threat environment

As a leading specialist in offensive security consulting, red teaming, and security strategies, ProSec understands security risks not only from a technical perspective, but also in terms of their business relevance. Our strength lies in combining attack simulation and social engineering consulting, software testing (penetration testing), and a deep understanding of governance, risk, and compliance structures.

For our customers, this means: security that doesn't burden the IT manager, but rather relieves the management.

Specifically, ProSec supports companies with:

  • Simulated attacks and social engineering campaigns on macOS, Windows and cloud environments
  • Building resilient zero-trust architectures
  • Analysis of suspicious activities via threat hunting
  • Development of management-ready security roadmaps
  • Crisis consultation and forensic analysis in specific infections (including stealer findings)


If you want to know whether infostealer threats are already active in your environment, we support you with pragmatic expertise, responsible procedures – and tools that speak plainly.

How do I reliably protect my company from hackers?
With the support of good hackers!
Contact us now

FAQ – Frequently asked questions about the current threat landscape posed by Python-based information stealers

An information stealer is malware whose primary goal is to steal information from infected systems and forward it to the attacker. This includes login credentials, authentication tokens, credit card numbers, or data from password managers.

macOS was less affected for a long time, but modern, platform-independent programming (e.g., in Python) made it more vulnerable. Furthermore, decision-makers, developers, and creative departments frequently use Apple devices—areas with a high potential for accessing sensitive data.

Malvertising is a combination of "malware" and "advertising." It involves distributing malicious software through online advertisements. If a user clicks on a manipulated ad, they are redirected to an infected website that delivers malicious code in the background.

ClickFix is ​​a social engineering scam that manipulates users into actively inserting malicious code into the terminal or input field – often under the guise of resolving an installation problem. This exploits the user's trust against them.

Signs can include unusual network connections, new processes on macOS devices, or credential leaks on the dark web. ProSec offers various assessments, forensic analyses, and threat simulations to provide clarity.

Do you have any questions or additions? bring it on!
Write a comment and we will reply as soon as possible!

Your email address will not be published. Required fields are marked with *.

Newsletter Form

Cybersecurity insider access with exclusive content and early access to security-relevant information

Become a Cyber ​​Security Insider

Get early access and exclusive content!


OTHER CONTRIBUTIONS

Table of Contents

Share your feedback and help us improve our services!

Share your feedback and help us improve our services!

Take 1 minute to give us some feedback. This way we can ensure that our IT security solutions meet your exact needs.