Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

NovaStealer - Apple Intelligence is leaving a plist.. it is legit, right?

0
Medium
Published: Fri Nov 14 2025 (11/14/2025, 12:04:55 UTC)
Source: AlienVault OTX General

Description

NovaStealer is a macOS-targeting cryptostealer malware that uses bash scripts to establish persistence and execute malicious modules. It installs itself in the ~/. mdrivers directory, uses screen sessions for stealthy background execution, and employs LaunchAgents to maintain persistence. The malware exfiltrates cryptocurrency wallet data, collects system information, and replaces legitimate wallet applications with malicious versions. It also uses WebKit to render phishing pages and tracks user behavior to increase effectiveness. While not highly sophisticated, its modular design allows remote updates, making it adaptable and persistent. The malware does not require prior authentication but relies on user interaction for initial infection, such as phishing. There are no known exploits in the wild yet, but the threat is notable due to its focus on valuable crypto assets on macOS systems.

AI-Powered Analysis

AILast updated: 11/14/2025, 12:46:26 UTC

Technical Analysis

NovaStealer is a modular cryptostealer malware specifically targeting macOS users, focusing on stealing cryptocurrency wallet data. It uses a bash-based script to install itself in the hidden ~/.mdrivers directory, leveraging screen sessions to run malicious modules in the background without user detection. Persistence is achieved through the creation of a LaunchAgent plist, which ensures the malware executes on system startup. The malware collects detailed system information and replaces legitimate wallet applications with malicious versions to intercept user credentials and crypto transactions. Additionally, it uses WebKit to render phishing pages locally, enhancing the likelihood of credential theft by mimicking legitimate wallet interfaces. User behavior tracking is employed to optimize phishing and data exfiltration activities. The modular architecture allows the threat actor to remotely update components, adding flexibility and longevity to the campaign. Despite lacking advanced evasion techniques, the malware’s focus on cryptocurrency wallets—a high-value target—makes it a significant threat. No CVE or public exploit references exist, and it is not currently known to be widespread, but its presence in the macOS ecosystem is concerning given the increasing adoption of Apple devices and cryptocurrency in Europe.

Potential Impact

For European organizations, especially those with employees or executives using macOS devices for cryptocurrency management or development, NovaStealer poses a significant risk of financial loss through theft of crypto assets. The malware’s ability to replace legitimate wallet applications can lead to undetected credential compromise and unauthorized transactions. The collection of system information may also expose sensitive corporate data or user privacy details. Organizations in fintech, cryptocurrency exchanges, and blockchain development sectors are particularly vulnerable. The persistence mechanisms and modular updates increase the difficulty of detection and removal, potentially leading to prolonged exposure. Given the growing adoption of macOS devices in European enterprises and the increasing interest in cryptocurrencies, the malware could impact both individual users and corporate environments, undermining trust and causing reputational damage. Additionally, phishing components may facilitate broader social engineering attacks within organizations.

Mitigation Recommendations

European organizations should implement macOS-specific endpoint detection and response (EDR) solutions capable of monitoring LaunchAgents and unusual use of screen sessions. Regular audits of user LaunchAgents and hidden directories like ~/.mdrivers should be conducted to detect unauthorized persistence mechanisms. Employ application whitelisting to prevent execution of unauthorized scripts and binaries, particularly those attempting to replace wallet applications. Educate users on phishing risks, emphasizing the dangers of interacting with suspicious links or applications, especially those related to cryptocurrency. Deploy network monitoring to detect unusual outbound connections indicative of data exfiltration. Use strong multi-factor authentication (MFA) for cryptocurrency wallets and related services to reduce the impact of credential theft. Encourage users to verify wallet application integrity via official sources and hashes. Maintain up-to-date backups of critical data and wallet keys in secure offline storage. Finally, monitor threat intelligence feeds for updates on NovaStealer and related indicators of compromise (IOCs) to enable timely detection and response.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://bruceketta.space/posts/nova-script-251110/"]
Adversary
null
Pulse Id
69171ae7e2bde9216bb457d4
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0f545ef0804f837ee172bdbd37184a48915cac5e8f6cbf5aa310160d2cff5c37
hash470d0df78818cab01970927fa7b076d723530efa4d8bacc580e95e24c2724cd1
hash480e8e46bf171c2ca2e7243386f793d205bc077e0eb9558d64d52ba3f18b96ab
hash8e655bff39e42f6a6f694f481ed476319c54f0595ad33392fc2ff7243f2f2843
hasha963b903353ff7027c95e19edb4cb89aa1680ce3d325aae53f78a437056ae8b7
hashb21c9c5e0a67f7ce3a031d0a6d08926e840af180eb616bee2e54d9c49b2c3da8
hashf3a7ce69a05da9b1faa6323f1ff7c5366d9a155212e391d13faaf84d4f23e20f

Threat ID: 69172119dd0733879bf23f98

Added to database: 11/14/2025, 12:31:21 PM

Last enriched: 11/14/2025, 12:46:26 PM

Last updated: 11/15/2025, 6:40:42 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats