Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

MacSync Stealer Returns: SEO Poisoning and Fake GitHub Repositories Target macOS Users

0
Medium
Published: Mon Jan 26 2026 (01/26/2026, 08:54:01 UTC)
Source: AlienVault OTX General

Description

The MacSync stealer campaign targets macOS and Windows users by leveraging SEO poisoning to redirect victims to fake GitHub repositories impersonating legitimate tools such as PagerDuty. The attack chain starts with a Google search leading to malicious GitHub repositories and GitHub Pages sites that deploy MacSync in three stages: loader, dropper, and payload. MacSync aggressively steals credentials from browsers, cloud services, and cryptocurrency wallets. The campaign has been active since September 2025 with 39 identified malicious repositories, 24 still active as of January 2026. Evasion techniques include 'readme-only' repositories and distributed identities to avoid detection. This threat does not require prior authentication but relies on user interaction via search and execution of deceptive commands. It poses a medium severity risk due to its broad credential theft capabilities and multi-stage infection process.

AI-Powered Analysis

AILast updated: 01/26/2026, 09:35:16 UTC

Technical Analysis

The MacSync stealer campaign is an active infostealer operation targeting both macOS and Windows users across multiple sectors. Threat actors employ SEO poisoning to manipulate search engine results, directing victims to fraudulent GitHub repositories that impersonate trusted tools like PagerDuty. These repositories host malicious code and redirect users to GitHub Pages sites that serve deceptive commands. The infection process unfolds in three stages: a loader that initiates the attack, a dropper that installs components, and the final MacSync payload. MacSync is designed to harvest sensitive information aggressively, including credentials stored in browsers, cloud service tokens, and cryptocurrency wallets. The campaign has been ongoing since at least September 2025, with 39 malicious repositories identified and 24 still active as of January 2026. To evade detection, attackers use 'readme-only' repositories that appear benign and distribute identities across multiple accounts. The malware leverages AppleScript on macOS and other scripting techniques to execute payloads stealthily. Indicators of compromise include multiple suspicious domains and URLs used for hosting payloads and command and control infrastructure. The campaign does not exploit software vulnerabilities but relies heavily on social engineering and user interaction, specifically through search engine manipulation and execution of commands from fake repositories. While no CVSS score is assigned, the threat is rated medium severity due to its potential for widespread credential theft and the complexity of its infection chain.

Potential Impact

European organizations face significant risks from this campaign due to the widespread use of macOS and Windows systems in business environments, especially in sectors reliant on cloud services and online tools like PagerDuty. Credential theft can lead to unauthorized access to corporate networks, cloud infrastructure, and financial assets, including cryptocurrency wallets. The multi-stage infection process increases the likelihood of successful compromise by evading traditional detection methods. SEO poisoning can affect any organization whose employees use search engines for software downloads or troubleshooting, increasing the attack surface. The theft of cloud service credentials can result in data breaches, service disruptions, and lateral movement within networks. Cryptocurrency wallet theft poses direct financial losses. The campaign's persistence and active repositories indicate ongoing risk, requiring continuous vigilance. Additionally, the use of fake GitHub repositories undermines trust in legitimate open-source platforms, potentially impacting developer workflows and software supply chains in Europe.

Mitigation Recommendations

European organizations should implement advanced threat detection focusing on anomalous GitHub repository access and unusual command execution patterns, especially those involving AppleScript on macOS. Security teams should educate users about the risks of downloading software or executing commands from unverified sources, emphasizing caution with search engine results. Deploy endpoint detection and response (EDR) solutions capable of detecting multi-stage malware behaviors, including loaders and droppers. Enforce strict application whitelisting and restrict execution of scripts from untrusted locations. Monitor network traffic for connections to known malicious domains and URLs associated with this campaign, blocking them at the firewall or proxy level. Regularly audit and rotate credentials, especially for cloud services and cryptocurrency wallets, and implement multi-factor authentication (MFA) to reduce the impact of stolen credentials. Use DNS filtering to prevent access to malicious domains. Collaborate with threat intelligence providers to stay updated on new malicious repositories and indicators of compromise. Finally, consider integrating security awareness training focused on recognizing SEO poisoning and social engineering tactics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://daylight.ai/blog/macsync-stealer-returns-seo-poisoning"]
Adversary
null
Pulse Id
69772ba9dd9a67872ce009f7
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://cotlesgengeral.com/
urlhttp://hci-outdoors.com/salt-engine.html
urlhttp://securityfenceandwelding.com/curl/79fbe2e4cccedda99204eeeeab1f4cb93ff81c1d08f2f28dfb1db80c187e1d43

Domain

ValueDescriptionCopy
domainarsenmarkaruyn.com
domaincotlesgengeral.com
domainhci-outdoors.com
domainmac-semen.com
domainmacfyno.com
domainsecurityfenceandwelding.com
domaingithub.macos-developer.com

Threat ID: 697731f84623b1157c79b499

Added to database: 1/26/2026, 9:20:56 AM

Last enriched: 1/26/2026, 9:35:16 AM

Last updated: 1/26/2026, 3:40:25 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats