
As Apple continues to gain market share, it's no surprise that malware developers are increasingly targeting the company's popular macOS operating system. The latest example is a piece of malware dubbed MacStealer, which is designed to siphon sensitive information from compromised devices. MacStealer is still a work in progress, but in its current form it is designed to extract iCloud Keychain data, passwords and credit card information from browsers like Google Chrome, Mozilla Firefox, and Brave. It also features support for harvesting Microsoft Office files, images, archives, and Python scripts. The exact method used to deliver the malware is not known, but it is propagated as a DMG file (weed.dmg) that, when executed, opens a fake password prompt to harvest the passwords under the guise of seeking access to the System Settings app. While MacStealer is still in development, it underscores the need for users to exercise caution when downloading files from untrusted sources and to use a reputable security solution to protect their devices.