Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets
A deceptive website impersonating CleanMyMac tricks users into installing SHub Stealer, a sophisticated macOS malware. The malware steals sensitive data, including passwords, browser data, cryptocurrency wallets, and Telegram sessions. It can also modify wallet apps to steal recovery phrases. The attack begins with users pasting a command into Terminal, which downloads and executes a malicious script. The malware performs extensive data collection from various browsers and wallet applications, and installs persistent backdoors in certain crypto wallet apps. SHub Stealer is part of a growing family of AppleScript-based macOS infostealers, demonstrating increasing sophistication in targeting Mac users.
AI Analysis
Technical Summary
The SHub Stealer malware campaign leverages a deceptive website impersonating the legitimate CleanMyMac software to lure macOS users into executing a malicious AppleScript payload. The infection vector involves social engineering where users are convinced to paste a command into the macOS Terminal, which downloads and runs a malicious script hosted on attacker-controlled domains such as cleanmymacos.org and res2erch-sl0ut.com. Once executed, SHub Stealer performs extensive data theft operations targeting stored passwords, browser data, Telegram session information, and critically, cryptocurrency wallets. The malware is capable of modifying wallet applications to extract recovery phrases, enabling attackers to gain full control over victims' crypto assets. It also installs persistent backdoors in certain wallet apps, allowing ongoing unauthorized access. The malware uses AppleScript, a scripting language native to macOS, to evade detection and maintain persistence. Techniques observed include credential dumping, browser data exfiltration, process injection, and command and control communications over HTTP. The campaign reflects a growing trend of macOS-targeted infostealers that exploit user trust and social engineering rather than software vulnerabilities. Indicators of compromise include specific malicious URLs and domains associated with payload delivery and C2 infrastructure. Although no CVE or known exploits in the wild are reported, the malware’s capabilities pose a serious threat to users with cryptocurrency holdings and sensitive personal data on macOS systems.
Potential Impact
The SHub Stealer malware can severely compromise the confidentiality and integrity of sensitive user data on macOS systems. By stealing passwords, browser data, Telegram sessions, and especially cryptocurrency wallet information including recovery phrases, it enables attackers to conduct financial theft and identity compromise. The modification and backdooring of wallet applications can lead to persistent unauthorized access and repeated theft of crypto assets. Organizations with employees using macOS devices for cryptocurrency management or sensitive communications risk data breaches and financial losses. The attack requires user interaction, limiting mass exploitation, but targeted users or organizations with lax security awareness are at high risk. The malware’s ability to evade detection through AppleScript and persistence mechanisms complicates incident response and remediation. The overall impact includes potential financial loss, reputational damage, and operational disruption for affected individuals and organizations.
Mitigation Recommendations
Organizations and users should avoid downloading software from unofficial or suspicious websites, especially for popular utilities like CleanMyMac. Security awareness training should emphasize the risks of executing unverified commands in Terminal and the dangers of social engineering. Deploy endpoint protection solutions capable of detecting malicious AppleScript behavior and monitor for unusual script executions. Implement application whitelisting to restrict execution of unauthorized scripts and binaries. Regularly back up critical data and securely store cryptocurrency wallet recovery phrases offline. Use hardware wallets or multi-factor authentication for crypto assets to reduce risk from software-based theft. Monitor network traffic for connections to known malicious domains such as cleanmymacos.org, res2erch-sl0ut.com, and wallets-gate.io. Incident response plans should include procedures for detecting and removing AppleScript-based malware and remediating compromised wallets. Encourage users to verify software authenticity through official vendor channels and avoid pasting commands from untrusted sources.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, Japan, South Korea, Singapore, France, Netherlands
Indicators of Compromise
- url: http://res2erch-sl0ut.com/debug/payload.applescript
- url: http://res2erch-sl0ut.com/gate
- url: http://wallets-gate.io/api/injection
- domain: cleanmymacos.org
- domain: res2erch-sl0ut.com
- domain: wallets-gate.io
Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets
Description
A deceptive website impersonating CleanMyMac tricks users into installing SHub Stealer, a sophisticated macOS malware. The malware steals sensitive data, including passwords, browser data, cryptocurrency wallets, and Telegram sessions. It can also modify wallet apps to steal recovery phrases. The attack begins with users pasting a command into Terminal, which downloads and executes a malicious script. The malware performs extensive data collection from various browsers and wallet applications, and installs persistent backdoors in certain crypto wallet apps. SHub Stealer is part of a growing family of AppleScript-based macOS infostealers, demonstrating increasing sophistication in targeting Mac users.
AI-Powered Analysis
Technical Analysis
The SHub Stealer malware campaign leverages a deceptive website impersonating the legitimate CleanMyMac software to lure macOS users into executing a malicious AppleScript payload. The infection vector involves social engineering where users are convinced to paste a command into the macOS Terminal, which downloads and runs a malicious script hosted on attacker-controlled domains such as cleanmymacos.org and res2erch-sl0ut.com. Once executed, SHub Stealer performs extensive data theft operations targeting stored passwords, browser data, Telegram session information, and critically, cryptocurrency wallets. The malware is capable of modifying wallet applications to extract recovery phrases, enabling attackers to gain full control over victims' crypto assets. It also installs persistent backdoors in certain wallet apps, allowing ongoing unauthorized access. The malware uses AppleScript, a scripting language native to macOS, to evade detection and maintain persistence. Techniques observed include credential dumping, browser data exfiltration, process injection, and command and control communications over HTTP. The campaign reflects a growing trend of macOS-targeted infostealers that exploit user trust and social engineering rather than software vulnerabilities. Indicators of compromise include specific malicious URLs and domains associated with payload delivery and C2 infrastructure. Although no CVE or known exploits in the wild are reported, the malware’s capabilities pose a serious threat to users with cryptocurrency holdings and sensitive personal data on macOS systems.
Potential Impact
The SHub Stealer malware can severely compromise the confidentiality and integrity of sensitive user data on macOS systems. By stealing passwords, browser data, Telegram sessions, and especially cryptocurrency wallet information including recovery phrases, it enables attackers to conduct financial theft and identity compromise. The modification and backdooring of wallet applications can lead to persistent unauthorized access and repeated theft of crypto assets. Organizations with employees using macOS devices for cryptocurrency management or sensitive communications risk data breaches and financial losses. The attack requires user interaction, limiting mass exploitation, but targeted users or organizations with lax security awareness are at high risk. The malware’s ability to evade detection through AppleScript and persistence mechanisms complicates incident response and remediation. The overall impact includes potential financial loss, reputational damage, and operational disruption for affected individuals and organizations.
Mitigation Recommendations
Organizations and users should avoid downloading software from unofficial or suspicious websites, especially for popular utilities like CleanMyMac. Security awareness training should emphasize the risks of executing unverified commands in Terminal and the dangers of social engineering. Deploy endpoint protection solutions capable of detecting malicious AppleScript behavior and monitor for unusual script executions. Implement application whitelisting to restrict execution of unauthorized scripts and binaries. Regularly back up critical data and securely store cryptocurrency wallet recovery phrases offline. Use hardware wallets or multi-factor authentication for crypto assets to reduce risk from software-based theft. Monitor network traffic for connections to known malicious domains such as cleanmymacos.org, res2erch-sl0ut.com, and wallets-gate.io. Incident response plans should include procedures for detecting and removing AppleScript-based malware and remediating compromised wallets. Encourage users to verify software authenticity through official vendor channels and avoid pasting commands from untrusted sources.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets"]
- Adversary
- null
- Pulse Id
- 69ae9dcd62b1927161472bf9
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://res2erch-sl0ut.com/debug/payload.applescript | — | |
urlhttp://res2erch-sl0ut.com/gate | — | |
urlhttp://wallets-gate.io/api/injection | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincleanmymacos.org | — | |
domainres2erch-sl0ut.com | — | |
domainwallets-gate.io | — |
Threat ID: 69aea2c22904315ca3f9aacb
Added to database: 3/9/2026, 10:36:50 AM
Last enriched: 3/9/2026, 10:52:15 AM
Last updated: 3/13/2026, 5:07:13 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.