Stealer Campaign Impacting SLTT macOS Users
MacSync Stealer is a macOS infostealer malware distributed as Malware-as-a-Service (MaaS) through SEO poisoning and fake CAPTCHA pages. It has evolved through multiple campaign iterations since November 2025, using fake download sites, malicious ChatGPT conversations, and shell-based loaders with dynamic AppleScript payloads. The malware tricks victims into running terminal commands via fake CAPTCHA pages promoted through Google-sponsored search results. It targets sensitive data including browser credentials, cryptocurrency wallets, SSH keys, cloud credentials, and Keychain data. A notable capability is trojanizing Ledger hardware wallet applications to capture seed phrases. The February 2026 campaign generated significant user interaction, with indications of a Russian-speaking operator ecosystem. The malware uses API key-gated command and control infrastructure and in-memory execution techniques to evade detection.
AI Analysis
Technical Summary
MacSync Stealer is a macOS infostealer operating as Malware-as-a-Service, distributed primarily through SEO poisoning and fake ClickFix CAPTCHA pages. The campaign has progressed through three main phases since November 2025: initially using fake download sites, then malicious ChatGPT conversations, and most recently employing sophisticated shell-based loaders with dynamic AppleScript payloads. Victims are redirected via Google-sponsored search results to fake CAPTCHA pages that deceive them into executing malicious terminal commands. The malware targets a broad range of sensitive information including browser credentials, cryptocurrency wallets, SSH keys, cloud provider credentials, and macOS Keychain data. A critical feature is the trojanization of Ledger hardware wallet applications to steal seed phrases. The February 2026 campaign saw over 18,000 clicks in three days, with Russian-language comments suggesting the operators are part of a Russian-speaking ecosystem. The malware uses API key-gated C2 infrastructure and in-memory execution to avoid detection and analysis.
Potential Impact
The malware compromises macOS users by stealing a wide array of sensitive credentials and secrets, including browser passwords, cryptocurrency wallet data, SSH keys, cloud service credentials, and Keychain items. The trojanization of Ledger hardware wallet applications poses a critical risk to cryptocurrency asset security by capturing seed phrases. The campaign's use of SEO poisoning and fake CAPTCHA pages increases the likelihood of victim infection through social engineering. The malware's evasion techniques, such as API key-gated command and control and in-memory execution, complicate detection and response efforts. Although no known exploits in the wild are reported, the campaign has demonstrated significant reach and user interaction.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since this malware relies on social engineering via fake CAPTCHA pages and terminal command execution, users should be educated not to run untrusted terminal commands or follow suspicious links from search results. Endpoint protection solutions with macOS malware detection capabilities may help identify and block this threat. Monitoring for indicators of compromise such as the provided hashes and domains can assist in detection. There is no official fix or patch available at this time.
Indicators of Compromise
- hash: 5190ef1733183a0dc63fb623357f56d6
- hash: 866993e9950250ac2ce8c3b4c6a8bd39285e0fafd93860f235a3b0370f160dd1
- hash: b2955c54eb0c047463993b379e015e737aabed37b456aeb0957cf84cdb0ed1f0
- hash: c56a1b268f358d9fb4d6264932706b53a7347e2544bb5f26355b0c7fc1d299d8
- url: http://filegrowthlabs.com/s3/?c=AA-
- url: http://filegrowthlabs.com/s3/?c=AA-0uWlVgQUAHYwCAFVTOQASAAAAAACP
- url: http://mansfieldpediatrics.com/curl/
- url: http://mansfieldpediatrics.com/curl/b2955c54eb0c047463993b379e015e737aabed37b456a
- url: http://mansfieldpediatrics.com/dynamic?txd=b2955c54eb0c047463993b379e015e737aabed
- url: http://mansfieldpediatrics.com/gate?buildtxd=b2955c54eb0c047463993b379e015e737aab
- url: https://main.mon2gate.net/modules/wallets
- url: https://mansfieldpediatrics.com/ledger/b2955c54eb0c047463993b379e015e737aabed37b4
- url: https://mansfieldpediatrics.com/ledger/live/b2955c54eb0c047463993b379e015e737aabe
- domain: filegrowthlabs.com
- domain: houstongaragedoorinstallers.com
- domain: mansfieldpediatrics.com
- domain: main.mon2gate.net
Stealer Campaign Impacting SLTT macOS Users
Description
MacSync Stealer is a macOS infostealer malware distributed as Malware-as-a-Service (MaaS) through SEO poisoning and fake CAPTCHA pages. It has evolved through multiple campaign iterations since November 2025, using fake download sites, malicious ChatGPT conversations, and shell-based loaders with dynamic AppleScript payloads. The malware tricks victims into running terminal commands via fake CAPTCHA pages promoted through Google-sponsored search results. It targets sensitive data including browser credentials, cryptocurrency wallets, SSH keys, cloud credentials, and Keychain data. A notable capability is trojanizing Ledger hardware wallet applications to capture seed phrases. The February 2026 campaign generated significant user interaction, with indications of a Russian-speaking operator ecosystem. The malware uses API key-gated command and control infrastructure and in-memory execution techniques to evade detection.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
MacSync Stealer is a macOS infostealer operating as Malware-as-a-Service, distributed primarily through SEO poisoning and fake ClickFix CAPTCHA pages. The campaign has progressed through three main phases since November 2025: initially using fake download sites, then malicious ChatGPT conversations, and most recently employing sophisticated shell-based loaders with dynamic AppleScript payloads. Victims are redirected via Google-sponsored search results to fake CAPTCHA pages that deceive them into executing malicious terminal commands. The malware targets a broad range of sensitive information including browser credentials, cryptocurrency wallets, SSH keys, cloud provider credentials, and macOS Keychain data. A critical feature is the trojanization of Ledger hardware wallet applications to steal seed phrases. The February 2026 campaign saw over 18,000 clicks in three days, with Russian-language comments suggesting the operators are part of a Russian-speaking ecosystem. The malware uses API key-gated C2 infrastructure and in-memory execution to avoid detection and analysis.
Potential Impact
The malware compromises macOS users by stealing a wide array of sensitive credentials and secrets, including browser passwords, cryptocurrency wallet data, SSH keys, cloud service credentials, and Keychain items. The trojanization of Ledger hardware wallet applications poses a critical risk to cryptocurrency asset security by capturing seed phrases. The campaign's use of SEO poisoning and fake CAPTCHA pages increases the likelihood of victim infection through social engineering. The malware's evasion techniques, such as API key-gated command and control and in-memory execution, complicate detection and response efforts. Although no known exploits in the wild are reported, the campaign has demonstrated significant reach and user interaction.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since this malware relies on social engineering via fake CAPTCHA pages and terminal command execution, users should be educated not to run untrusted terminal commands or follow suspicious links from search results. Endpoint protection solutions with macOS malware detection capabilities may help identify and block this threat. Monitoring for indicators of compromise such as the provided hashes and domains can assist in detection. There is no official fix or patch available at this time.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- []
- Adversary
- null
- Pulse Id
- 69d7ed2e323d7edb856fa161
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash5190ef1733183a0dc63fb623357f56d6 | — | |
hash866993e9950250ac2ce8c3b4c6a8bd39285e0fafd93860f235a3b0370f160dd1 | — | |
hashb2955c54eb0c047463993b379e015e737aabed37b456aeb0957cf84cdb0ed1f0 | — | |
hashc56a1b268f358d9fb4d6264932706b53a7347e2544bb5f26355b0c7fc1d299d8 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://filegrowthlabs.com/s3/?c=AA- | — | |
urlhttp://filegrowthlabs.com/s3/?c=AA-0uWlVgQUAHYwCAFVTOQASAAAAAACP | — | |
urlhttp://mansfieldpediatrics.com/curl/ | — | |
urlhttp://mansfieldpediatrics.com/curl/b2955c54eb0c047463993b379e015e737aabed37b456a | — | |
urlhttp://mansfieldpediatrics.com/dynamic?txd=b2955c54eb0c047463993b379e015e737aabed | — | |
urlhttp://mansfieldpediatrics.com/gate?buildtxd=b2955c54eb0c047463993b379e015e737aab | — | |
urlhttps://main.mon2gate.net/modules/wallets | — | |
urlhttps://mansfieldpediatrics.com/ledger/b2955c54eb0c047463993b379e015e737aabed37b4 | — | |
urlhttps://mansfieldpediatrics.com/ledger/live/b2955c54eb0c047463993b379e015e737aabe | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainfilegrowthlabs.com | — | |
domainhoustongaragedoorinstallers.com | — | |
domainmansfieldpediatrics.com | — | |
domainmain.mon2gate.net | — |
Threat ID: 69d7f1821cc7ad14da06f834
Added to database: 4/9/2026, 6:35:46 PM
Last enriched: 4/9/2026, 6:50:52 PM
Last updated: 4/10/2026, 4:49:38 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.