NovaStealer - Apple Intelligence is leaving a plist.. it is legit, right?
NovaStealer is a macOS-targeting cryptostealer malware that uses bash scripts to establish persistence and execute malicious modules. It installs itself in the ~/. mdrivers directory, uses screen sessions for stealthy background execution, and employs LaunchAgents to maintain persistence. The malware exfiltrates cryptocurrency wallet data, collects system information, and replaces legitimate wallet applications with malicious versions. It also uses WebKit to render phishing pages and tracks user behavior to increase effectiveness. While not highly sophisticated, its modular design allows remote updates, making it adaptable and persistent. The malware does not require prior authentication but relies on user interaction for initial infection, such as phishing. There are no known exploits in the wild yet, but the threat is notable due to its focus on valuable crypto assets on macOS systems.
AI Analysis
Technical Summary
NovaStealer is a modular cryptostealer malware specifically targeting macOS users, focusing on stealing cryptocurrency wallet data. It uses a bash-based script to install itself in the hidden ~/.mdrivers directory, leveraging screen sessions to run malicious modules in the background without user detection. Persistence is achieved through the creation of a LaunchAgent plist, which ensures the malware executes on system startup. The malware collects detailed system information and replaces legitimate wallet applications with malicious versions to intercept user credentials and crypto transactions. Additionally, it uses WebKit to render phishing pages locally, enhancing the likelihood of credential theft by mimicking legitimate wallet interfaces. User behavior tracking is employed to optimize phishing and data exfiltration activities. The modular architecture allows the threat actor to remotely update components, adding flexibility and longevity to the campaign. Despite lacking advanced evasion techniques, the malware’s focus on cryptocurrency wallets—a high-value target—makes it a significant threat. No CVE or public exploit references exist, and it is not currently known to be widespread, but its presence in the macOS ecosystem is concerning given the increasing adoption of Apple devices and cryptocurrency in Europe.
Potential Impact
For European organizations, especially those with employees or executives using macOS devices for cryptocurrency management or development, NovaStealer poses a significant risk of financial loss through theft of crypto assets. The malware’s ability to replace legitimate wallet applications can lead to undetected credential compromise and unauthorized transactions. The collection of system information may also expose sensitive corporate data or user privacy details. Organizations in fintech, cryptocurrency exchanges, and blockchain development sectors are particularly vulnerable. The persistence mechanisms and modular updates increase the difficulty of detection and removal, potentially leading to prolonged exposure. Given the growing adoption of macOS devices in European enterprises and the increasing interest in cryptocurrencies, the malware could impact both individual users and corporate environments, undermining trust and causing reputational damage. Additionally, phishing components may facilitate broader social engineering attacks within organizations.
Mitigation Recommendations
European organizations should implement macOS-specific endpoint detection and response (EDR) solutions capable of monitoring LaunchAgents and unusual use of screen sessions. Regular audits of user LaunchAgents and hidden directories like ~/.mdrivers should be conducted to detect unauthorized persistence mechanisms. Employ application whitelisting to prevent execution of unauthorized scripts and binaries, particularly those attempting to replace wallet applications. Educate users on phishing risks, emphasizing the dangers of interacting with suspicious links or applications, especially those related to cryptocurrency. Deploy network monitoring to detect unusual outbound connections indicative of data exfiltration. Use strong multi-factor authentication (MFA) for cryptocurrency wallets and related services to reduce the impact of credential theft. Encourage users to verify wallet application integrity via official sources and hashes. Maintain up-to-date backups of critical data and wallet keys in secure offline storage. Finally, monitor threat intelligence feeds for updates on NovaStealer and related indicators of compromise (IOCs) to enable timely detection and response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
Indicators of Compromise
- hash: 0f545ef0804f837ee172bdbd37184a48915cac5e8f6cbf5aa310160d2cff5c37
- hash: 470d0df78818cab01970927fa7b076d723530efa4d8bacc580e95e24c2724cd1
- hash: 480e8e46bf171c2ca2e7243386f793d205bc077e0eb9558d64d52ba3f18b96ab
- hash: 8e655bff39e42f6a6f694f481ed476319c54f0595ad33392fc2ff7243f2f2843
- hash: a963b903353ff7027c95e19edb4cb89aa1680ce3d325aae53f78a437056ae8b7
- hash: b21c9c5e0a67f7ce3a031d0a6d08926e840af180eb616bee2e54d9c49b2c3da8
- hash: f3a7ce69a05da9b1faa6323f1ff7c5366d9a155212e391d13faaf84d4f23e20f
NovaStealer - Apple Intelligence is leaving a plist.. it is legit, right?
Description
NovaStealer is a macOS-targeting cryptostealer malware that uses bash scripts to establish persistence and execute malicious modules. It installs itself in the ~/. mdrivers directory, uses screen sessions for stealthy background execution, and employs LaunchAgents to maintain persistence. The malware exfiltrates cryptocurrency wallet data, collects system information, and replaces legitimate wallet applications with malicious versions. It also uses WebKit to render phishing pages and tracks user behavior to increase effectiveness. While not highly sophisticated, its modular design allows remote updates, making it adaptable and persistent. The malware does not require prior authentication but relies on user interaction for initial infection, such as phishing. There are no known exploits in the wild yet, but the threat is notable due to its focus on valuable crypto assets on macOS systems.
AI-Powered Analysis
Technical Analysis
NovaStealer is a modular cryptostealer malware specifically targeting macOS users, focusing on stealing cryptocurrency wallet data. It uses a bash-based script to install itself in the hidden ~/.mdrivers directory, leveraging screen sessions to run malicious modules in the background without user detection. Persistence is achieved through the creation of a LaunchAgent plist, which ensures the malware executes on system startup. The malware collects detailed system information and replaces legitimate wallet applications with malicious versions to intercept user credentials and crypto transactions. Additionally, it uses WebKit to render phishing pages locally, enhancing the likelihood of credential theft by mimicking legitimate wallet interfaces. User behavior tracking is employed to optimize phishing and data exfiltration activities. The modular architecture allows the threat actor to remotely update components, adding flexibility and longevity to the campaign. Despite lacking advanced evasion techniques, the malware’s focus on cryptocurrency wallets—a high-value target—makes it a significant threat. No CVE or public exploit references exist, and it is not currently known to be widespread, but its presence in the macOS ecosystem is concerning given the increasing adoption of Apple devices and cryptocurrency in Europe.
Potential Impact
For European organizations, especially those with employees or executives using macOS devices for cryptocurrency management or development, NovaStealer poses a significant risk of financial loss through theft of crypto assets. The malware’s ability to replace legitimate wallet applications can lead to undetected credential compromise and unauthorized transactions. The collection of system information may also expose sensitive corporate data or user privacy details. Organizations in fintech, cryptocurrency exchanges, and blockchain development sectors are particularly vulnerable. The persistence mechanisms and modular updates increase the difficulty of detection and removal, potentially leading to prolonged exposure. Given the growing adoption of macOS devices in European enterprises and the increasing interest in cryptocurrencies, the malware could impact both individual users and corporate environments, undermining trust and causing reputational damage. Additionally, phishing components may facilitate broader social engineering attacks within organizations.
Mitigation Recommendations
European organizations should implement macOS-specific endpoint detection and response (EDR) solutions capable of monitoring LaunchAgents and unusual use of screen sessions. Regular audits of user LaunchAgents and hidden directories like ~/.mdrivers should be conducted to detect unauthorized persistence mechanisms. Employ application whitelisting to prevent execution of unauthorized scripts and binaries, particularly those attempting to replace wallet applications. Educate users on phishing risks, emphasizing the dangers of interacting with suspicious links or applications, especially those related to cryptocurrency. Deploy network monitoring to detect unusual outbound connections indicative of data exfiltration. Use strong multi-factor authentication (MFA) for cryptocurrency wallets and related services to reduce the impact of credential theft. Encourage users to verify wallet application integrity via official sources and hashes. Maintain up-to-date backups of critical data and wallet keys in secure offline storage. Finally, monitor threat intelligence feeds for updates on NovaStealer and related indicators of compromise (IOCs) to enable timely detection and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://bruceketta.space/posts/nova-script-251110/"]
- Adversary
- null
- Pulse Id
- 69171ae7e2bde9216bb457d4
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0f545ef0804f837ee172bdbd37184a48915cac5e8f6cbf5aa310160d2cff5c37 | — | |
hash470d0df78818cab01970927fa7b076d723530efa4d8bacc580e95e24c2724cd1 | — | |
hash480e8e46bf171c2ca2e7243386f793d205bc077e0eb9558d64d52ba3f18b96ab | — | |
hash8e655bff39e42f6a6f694f481ed476319c54f0595ad33392fc2ff7243f2f2843 | — | |
hasha963b903353ff7027c95e19edb4cb89aa1680ce3d325aae53f78a437056ae8b7 | — | |
hashb21c9c5e0a67f7ce3a031d0a6d08926e840af180eb616bee2e54d9c49b2c3da8 | — | |
hashf3a7ce69a05da9b1faa6323f1ff7c5366d9a155212e391d13faaf84d4f23e20f | — |
Threat ID: 69172119dd0733879bf23f98
Added to database: 11/14/2025, 12:31:21 PM
Last enriched: 11/14/2025, 12:46:26 PM
Last updated: 11/15/2025, 6:40:42 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
New Security Tools Target Growing macOS Threats
MediumThreatFox IOCs for 2025-11-14
MediumOperation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown
MediumNorth Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
MediumIn Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.