Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Inside MacSync's Script-Driven Stealer and Hardware Wallet App Trojanization

0
Medium
Published: Wed Jan 21 2026 (01/21/2026, 18:46:01 UTC)
Source: AlienVault OTX General

Description

MacSync is a sophisticated macOS infostealer that targets cryptocurrency users. It is delivered through a phishing lure disguised as a cloud storage installer, tricking users into executing a malicious Terminal command. The malware employs a multi-stage infection process, using a script-based approach to harvest browser credentials, cryptocurrency wallet data, and sensitive files. A key feature of MacSync is its ability to trojanize popular Electron-based cryptocurrency applications like Ledger and Trezor, enabling long-term phishing and data exfiltration. The malware's infrastructure includes multiple rotating C2 domains and clone sites, indicating an ongoing and evolving campaign. MacSync's focus on cryptocurrency-related data and its stealthy, script-based execution make it particularly dangerous for macOS users in the crypto community.

AI-Powered Analysis

AILast updated: 01/21/2026, 23:20:30 UTC

Technical Analysis

MacSync is an advanced macOS infostealer malware campaign primarily targeting cryptocurrency users. It is distributed through phishing lures masquerading as legitimate cloud storage installers, which trick victims into executing malicious Terminal commands. This script-driven malware operates in multiple stages, initially harvesting browser-stored credentials and sensitive files, then focusing on cryptocurrency wallet data. A distinctive feature of MacSync is its ability to trojanize popular Electron-based cryptocurrency hardware wallet applications such as Ledger Live and Trezor Suite. By injecting malicious code into these apps, MacSync enables long-term phishing and continuous data exfiltration without raising immediate suspicion. The malware infrastructure includes multiple rotating command-and-control (C2) domains and clone websites, demonstrating an ongoing and adaptive campaign. Indicators of compromise include numerous suspicious domains and file hashes associated with the malware. The infection vector relies on social engineering to convince users to run Terminal commands, bypassing traditional macOS security controls. The malware leverages various MITRE ATT&CK techniques such as script execution (T1059.002), credential dumping (T1555), and masquerading (T1036.005). Although no CVE or known exploits are associated, the campaign’s focus on cryptocurrency assets and hardware wallets makes it particularly dangerous for targeted users. The campaign’s stealthy nature and multi-stage infection process complicate detection and remediation.

Potential Impact

For European organizations and users, MacSync poses a significant threat to the confidentiality and integrity of cryptocurrency assets and sensitive data on macOS devices. The trojanization of widely used hardware wallet applications like Ledger and Trezor could lead to prolonged undetected theft of private keys and credentials, resulting in direct financial losses. Organizations involved in cryptocurrency trading, fintech, or blockchain development are at heightened risk. The malware’s ability to harvest browser credentials and files may also expose corporate secrets and personal information, potentially leading to identity theft or further targeted attacks. The phishing delivery method exploits user trust and can bypass standard endpoint protections if users execute the malicious commands. Given the increasing adoption of cryptocurrency in Europe, especially in countries with active crypto communities, the threat could disrupt business operations and erode trust in digital asset management. The rotating C2 infrastructure indicates a persistent campaign that may evolve to evade detection, increasing the risk of widespread infections if not mitigated promptly.

Mitigation Recommendations

European organizations should implement targeted defenses beyond generic advice: 1) Educate macOS users, especially those handling cryptocurrency, about the risks of executing unsolicited Terminal commands and phishing lures disguised as legitimate installers. 2) Deploy endpoint detection and response (EDR) solutions capable of monitoring script execution and detecting anomalous behavior related to Electron app tampering. 3) Implement application whitelisting and restrict execution of unsigned or untrusted scripts and binaries on macOS endpoints. 4) Monitor network traffic for connections to known malicious domains associated with MacSync’s C2 infrastructure and block them at the firewall or DNS level. 5) Regularly audit and verify the integrity of cryptocurrency wallet applications to detect trojanization or unauthorized modifications. 6) Encourage use of hardware wallets with strong firmware verification and multi-factor authentication where possible. 7) Maintain updated backups of critical data and ensure incident response plans include procedures for macOS-specific malware. 8) Collaborate with threat intelligence sharing groups to stay informed about evolving indicators of compromise related to MacSync.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cloudsek.com/blog/inside-macsyncs-script-driven-stealer-and-hardware-wallet-app-trojanization"]
Adversary
null
Pulse Id
69711eea5249f136051acf6c
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainfoo-bar.fish
domainmanifest.in
domainxmlpull.org
domainapp-webview.dreamplug.in
domainmerchant-app-prod.dreamplug.in
domainwebview-prod.dreamplug.in
domaincrosoftonline.com
domainjmpbowl.coupons
domainjmpbowl.fun
domainjmpbowl.shop
domainjmpbowl.space
domainjmpbowl.today
domainjmpbowl.top
domainjmpbowl.world
domainjmpbowl.xyz
domainmacclouddrive.com
domainmaccloudsafe.com
domainmaccloudvault.com
domainmacfilebackup.com
domainmacfiledrive.com
domainmacfilevault.com

Hash

ValueDescriptionCopy
hash1fe278fd06404638a50bf7b126f9075c
hash5190ef1733183a0dc63fb623357f56d6
hash70c0ee60591fed92b387ddd77122f3f5e88ae946efdd5eef8aa654cf156ed321
hash89a229f9a73cffc67089f388c6c12f3f9d80e7ae2c32745cd5212421a89c3e50
hashc99dea85f0ef8d3e2f3771c8ebd02d7dee0d90efc5c8392e5c266a59640a4206
hashec6bc84be18ce4cb55fb915370c00f2a836ffefc65c6b728efb8d2d28036e376

Threat ID: 69715bd34623b1157cf1b923

Added to database: 1/21/2026, 11:05:55 PM

Last enriched: 1/21/2026, 11:20:30 PM

Last updated: 2/5/2026, 9:39:52 AM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats