MacSync Stealer Returns: SEO Poisoning and Fake GitHub Repositories Target macOS Users
An active infostealer campaign is targeting macOS and Windows users across various sectors. The threat actors are using SEO poisoning to direct victims to fake GitHub repositories impersonating legitimate tools like PagerDuty. The campaign involves over 20 malicious repositories active since September 2025. The attack flow begins with a Google search, leading to a fraudulent GitHub repository, then to a GitHub Pages site with a deceptive command. This command deploys the MacSync stealer in three stages: a loader, a dropper, and the final payload. MacSync aggressively harvests credentials from browsers, cloud services, and cryptocurrency wallets. The campaign's scale includes 39 identified malicious repositories, with 24 still active as of January 2026. Evasion tactics include using 'readme-only' repositories and distributed identities.
AI Analysis
Technical Summary
The MacSync stealer campaign is an active infostealer operation targeting both macOS and Windows users across multiple sectors. Threat actors employ SEO poisoning to manipulate search engine results, directing victims to fraudulent GitHub repositories that impersonate trusted tools like PagerDuty. These repositories host malicious code and redirect users to GitHub Pages sites that serve deceptive commands. The infection process unfolds in three stages: a loader that initiates the attack, a dropper that installs components, and the final MacSync payload. MacSync is designed to harvest sensitive information aggressively, including credentials stored in browsers, cloud service tokens, and cryptocurrency wallets. The campaign has been ongoing since at least September 2025, with 39 malicious repositories identified and 24 still active as of January 2026. To evade detection, attackers use 'readme-only' repositories that appear benign and distribute identities across multiple accounts. The malware leverages AppleScript on macOS and other scripting techniques to execute payloads stealthily. Indicators of compromise include multiple suspicious domains and URLs used for hosting payloads and command and control infrastructure. The campaign does not exploit software vulnerabilities but relies heavily on social engineering and user interaction, specifically through search engine manipulation and execution of commands from fake repositories. While no CVSS score is assigned, the threat is rated medium severity due to its potential for widespread credential theft and the complexity of its infection chain.
Potential Impact
European organizations face significant risks from this campaign due to the widespread use of macOS and Windows systems in business environments, especially in sectors reliant on cloud services and online tools like PagerDuty. Credential theft can lead to unauthorized access to corporate networks, cloud infrastructure, and financial assets, including cryptocurrency wallets. The multi-stage infection process increases the likelihood of successful compromise by evading traditional detection methods. SEO poisoning can affect any organization whose employees use search engines for software downloads or troubleshooting, increasing the attack surface. The theft of cloud service credentials can result in data breaches, service disruptions, and lateral movement within networks. Cryptocurrency wallet theft poses direct financial losses. The campaign's persistence and active repositories indicate ongoing risk, requiring continuous vigilance. Additionally, the use of fake GitHub repositories undermines trust in legitimate open-source platforms, potentially impacting developer workflows and software supply chains in Europe.
Mitigation Recommendations
European organizations should implement advanced threat detection focusing on anomalous GitHub repository access and unusual command execution patterns, especially those involving AppleScript on macOS. Security teams should educate users about the risks of downloading software or executing commands from unverified sources, emphasizing caution with search engine results. Deploy endpoint detection and response (EDR) solutions capable of detecting multi-stage malware behaviors, including loaders and droppers. Enforce strict application whitelisting and restrict execution of scripts from untrusted locations. Monitor network traffic for connections to known malicious domains and URLs associated with this campaign, blocking them at the firewall or proxy level. Regularly audit and rotate credentials, especially for cloud services and cryptocurrency wallets, and implement multi-factor authentication (MFA) to reduce the impact of stolen credentials. Use DNS filtering to prevent access to malicious domains. Collaborate with threat intelligence providers to stay updated on new malicious repositories and indicators of compromise. Finally, consider integrating security awareness training focused on recognizing SEO poisoning and social engineering tactics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Belgium, Italy
Indicators of Compromise
- url: http://cotlesgengeral.com/
- url: http://hci-outdoors.com/salt-engine.html
- url: http://securityfenceandwelding.com/curl/79fbe2e4cccedda99204eeeeab1f4cb93ff81c1d08f2f28dfb1db80c187e1d43
- domain: arsenmarkaruyn.com
- domain: cotlesgengeral.com
- domain: hci-outdoors.com
- domain: mac-semen.com
- domain: macfyno.com
- domain: securityfenceandwelding.com
- domain: github.macos-developer.com
MacSync Stealer Returns: SEO Poisoning and Fake GitHub Repositories Target macOS Users
Description
An active infostealer campaign is targeting macOS and Windows users across various sectors. The threat actors are using SEO poisoning to direct victims to fake GitHub repositories impersonating legitimate tools like PagerDuty. The campaign involves over 20 malicious repositories active since September 2025. The attack flow begins with a Google search, leading to a fraudulent GitHub repository, then to a GitHub Pages site with a deceptive command. This command deploys the MacSync stealer in three stages: a loader, a dropper, and the final payload. MacSync aggressively harvests credentials from browsers, cloud services, and cryptocurrency wallets. The campaign's scale includes 39 identified malicious repositories, with 24 still active as of January 2026. Evasion tactics include using 'readme-only' repositories and distributed identities.
AI-Powered Analysis
Technical Analysis
The MacSync stealer campaign is an active infostealer operation targeting both macOS and Windows users across multiple sectors. Threat actors employ SEO poisoning to manipulate search engine results, directing victims to fraudulent GitHub repositories that impersonate trusted tools like PagerDuty. These repositories host malicious code and redirect users to GitHub Pages sites that serve deceptive commands. The infection process unfolds in three stages: a loader that initiates the attack, a dropper that installs components, and the final MacSync payload. MacSync is designed to harvest sensitive information aggressively, including credentials stored in browsers, cloud service tokens, and cryptocurrency wallets. The campaign has been ongoing since at least September 2025, with 39 malicious repositories identified and 24 still active as of January 2026. To evade detection, attackers use 'readme-only' repositories that appear benign and distribute identities across multiple accounts. The malware leverages AppleScript on macOS and other scripting techniques to execute payloads stealthily. Indicators of compromise include multiple suspicious domains and URLs used for hosting payloads and command and control infrastructure. The campaign does not exploit software vulnerabilities but relies heavily on social engineering and user interaction, specifically through search engine manipulation and execution of commands from fake repositories. While no CVSS score is assigned, the threat is rated medium severity due to its potential for widespread credential theft and the complexity of its infection chain.
Potential Impact
European organizations face significant risks from this campaign due to the widespread use of macOS and Windows systems in business environments, especially in sectors reliant on cloud services and online tools like PagerDuty. Credential theft can lead to unauthorized access to corporate networks, cloud infrastructure, and financial assets, including cryptocurrency wallets. The multi-stage infection process increases the likelihood of successful compromise by evading traditional detection methods. SEO poisoning can affect any organization whose employees use search engines for software downloads or troubleshooting, increasing the attack surface. The theft of cloud service credentials can result in data breaches, service disruptions, and lateral movement within networks. Cryptocurrency wallet theft poses direct financial losses. The campaign's persistence and active repositories indicate ongoing risk, requiring continuous vigilance. Additionally, the use of fake GitHub repositories undermines trust in legitimate open-source platforms, potentially impacting developer workflows and software supply chains in Europe.
Mitigation Recommendations
European organizations should implement advanced threat detection focusing on anomalous GitHub repository access and unusual command execution patterns, especially those involving AppleScript on macOS. Security teams should educate users about the risks of downloading software or executing commands from unverified sources, emphasizing caution with search engine results. Deploy endpoint detection and response (EDR) solutions capable of detecting multi-stage malware behaviors, including loaders and droppers. Enforce strict application whitelisting and restrict execution of scripts from untrusted locations. Monitor network traffic for connections to known malicious domains and URLs associated with this campaign, blocking them at the firewall or proxy level. Regularly audit and rotate credentials, especially for cloud services and cryptocurrency wallets, and implement multi-factor authentication (MFA) to reduce the impact of stolen credentials. Use DNS filtering to prevent access to malicious domains. Collaborate with threat intelligence providers to stay updated on new malicious repositories and indicators of compromise. Finally, consider integrating security awareness training focused on recognizing SEO poisoning and social engineering tactics.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://daylight.ai/blog/macsync-stealer-returns-seo-poisoning"]
- Adversary
- null
- Pulse Id
- 69772ba9dd9a67872ce009f7
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://cotlesgengeral.com/ | — | |
urlhttp://hci-outdoors.com/salt-engine.html | — | |
urlhttp://securityfenceandwelding.com/curl/79fbe2e4cccedda99204eeeeab1f4cb93ff81c1d08f2f28dfb1db80c187e1d43 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainarsenmarkaruyn.com | — | |
domaincotlesgengeral.com | — | |
domainhci-outdoors.com | — | |
domainmac-semen.com | — | |
domainmacfyno.com | — | |
domainsecurityfenceandwelding.com | — | |
domaingithub.macos-developer.com | — |
Threat ID: 697731f84623b1157c79b499
Added to database: 1/26/2026, 9:20:56 AM
Last enriched: 1/26/2026, 9:35:16 AM
Last updated: 2/7/2026, 8:00:34 AM
Views: 250
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.