Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets

0
Medium
Published: Mon Mar 09 2026 (03/09/2026, 10:15:41 UTC)
Source: AlienVault OTX General

Description

A deceptive website impersonating CleanMyMac tricks users into installing SHub Stealer, a sophisticated macOS malware. The malware steals sensitive data, including passwords, browser data, cryptocurrency wallets, and Telegram sessions. It can also modify wallet apps to steal recovery phrases. The attack begins with users pasting a command into Terminal, which downloads and executes a malicious script. The malware performs extensive data collection from various browsers and wallet applications, and installs persistent backdoors in certain crypto wallet apps. SHub Stealer is part of a growing family of AppleScript-based macOS infostealers, demonstrating increasing sophistication in targeting Mac users.

AI-Powered Analysis

AILast updated: 03/09/2026, 10:52:15 UTC

Technical Analysis

The SHub Stealer malware campaign leverages a deceptive website impersonating the legitimate CleanMyMac software to lure macOS users into executing a malicious AppleScript payload. The infection vector involves social engineering where users are convinced to paste a command into the macOS Terminal, which downloads and runs a malicious script hosted on attacker-controlled domains such as cleanmymacos.org and res2erch-sl0ut.com. Once executed, SHub Stealer performs extensive data theft operations targeting stored passwords, browser data, Telegram session information, and critically, cryptocurrency wallets. The malware is capable of modifying wallet applications to extract recovery phrases, enabling attackers to gain full control over victims' crypto assets. It also installs persistent backdoors in certain wallet apps, allowing ongoing unauthorized access. The malware uses AppleScript, a scripting language native to macOS, to evade detection and maintain persistence. Techniques observed include credential dumping, browser data exfiltration, process injection, and command and control communications over HTTP. The campaign reflects a growing trend of macOS-targeted infostealers that exploit user trust and social engineering rather than software vulnerabilities. Indicators of compromise include specific malicious URLs and domains associated with payload delivery and C2 infrastructure. Although no CVE or known exploits in the wild are reported, the malware’s capabilities pose a serious threat to users with cryptocurrency holdings and sensitive personal data on macOS systems.

Potential Impact

The SHub Stealer malware can severely compromise the confidentiality and integrity of sensitive user data on macOS systems. By stealing passwords, browser data, Telegram sessions, and especially cryptocurrency wallet information including recovery phrases, it enables attackers to conduct financial theft and identity compromise. The modification and backdooring of wallet applications can lead to persistent unauthorized access and repeated theft of crypto assets. Organizations with employees using macOS devices for cryptocurrency management or sensitive communications risk data breaches and financial losses. The attack requires user interaction, limiting mass exploitation, but targeted users or organizations with lax security awareness are at high risk. The malware’s ability to evade detection through AppleScript and persistence mechanisms complicates incident response and remediation. The overall impact includes potential financial loss, reputational damage, and operational disruption for affected individuals and organizations.

Mitigation Recommendations

Organizations and users should avoid downloading software from unofficial or suspicious websites, especially for popular utilities like CleanMyMac. Security awareness training should emphasize the risks of executing unverified commands in Terminal and the dangers of social engineering. Deploy endpoint protection solutions capable of detecting malicious AppleScript behavior and monitor for unusual script executions. Implement application whitelisting to restrict execution of unauthorized scripts and binaries. Regularly back up critical data and securely store cryptocurrency wallet recovery phrases offline. Use hardware wallets or multi-factor authentication for crypto assets to reduce risk from software-based theft. Monitor network traffic for connections to known malicious domains such as cleanmymacos.org, res2erch-sl0ut.com, and wallets-gate.io. Incident response plans should include procedures for detecting and removing AppleScript-based malware and remediating compromised wallets. Encourage users to verify software authenticity through official vendor channels and avoid pasting commands from untrusted sources.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets"]
Adversary
null
Pulse Id
69ae9dcd62b1927161472bf9
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://res2erch-sl0ut.com/debug/payload.applescript
urlhttp://res2erch-sl0ut.com/gate
urlhttp://wallets-gate.io/api/injection

Domain

ValueDescriptionCopy
domaincleanmymacos.org
domainres2erch-sl0ut.com
domainwallets-gate.io

Threat ID: 69aea2c22904315ca3f9aacb

Added to database: 3/9/2026, 10:36:50 AM

Last enriched: 3/9/2026, 10:52:15 AM

Last updated: 3/13/2026, 5:07:13 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses