Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Stealer Campaign Impacting SLTT macOS Users

0
Medium
Published: Thu Apr 09 2026 (04/09/2026, 18:17:18 UTC)
Source: AlienVault OTX General

Description

MacSync Stealer is a macOS infostealer malware distributed as Malware-as-a-Service (MaaS) through SEO poisoning and fake CAPTCHA pages. It has evolved through multiple campaign iterations since November 2025, using fake download sites, malicious ChatGPT conversations, and shell-based loaders with dynamic AppleScript payloads. The malware tricks victims into running terminal commands via fake CAPTCHA pages promoted through Google-sponsored search results. It targets sensitive data including browser credentials, cryptocurrency wallets, SSH keys, cloud credentials, and Keychain data. A notable capability is trojanizing Ledger hardware wallet applications to capture seed phrases. The February 2026 campaign generated significant user interaction, with indications of a Russian-speaking operator ecosystem. The malware uses API key-gated command and control infrastructure and in-memory execution techniques to evade detection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 18:50:52 UTC

Technical Analysis

MacSync Stealer is a macOS infostealer operating as Malware-as-a-Service, distributed primarily through SEO poisoning and fake ClickFix CAPTCHA pages. The campaign has progressed through three main phases since November 2025: initially using fake download sites, then malicious ChatGPT conversations, and most recently employing sophisticated shell-based loaders with dynamic AppleScript payloads. Victims are redirected via Google-sponsored search results to fake CAPTCHA pages that deceive them into executing malicious terminal commands. The malware targets a broad range of sensitive information including browser credentials, cryptocurrency wallets, SSH keys, cloud provider credentials, and macOS Keychain data. A critical feature is the trojanization of Ledger hardware wallet applications to steal seed phrases. The February 2026 campaign saw over 18,000 clicks in three days, with Russian-language comments suggesting the operators are part of a Russian-speaking ecosystem. The malware uses API key-gated C2 infrastructure and in-memory execution to avoid detection and analysis.

Potential Impact

The malware compromises macOS users by stealing a wide array of sensitive credentials and secrets, including browser passwords, cryptocurrency wallet data, SSH keys, cloud service credentials, and Keychain items. The trojanization of Ledger hardware wallet applications poses a critical risk to cryptocurrency asset security by capturing seed phrases. The campaign's use of SEO poisoning and fake CAPTCHA pages increases the likelihood of victim infection through social engineering. The malware's evasion techniques, such as API key-gated command and control and in-memory execution, complicate detection and response efforts. Although no known exploits in the wild are reported, the campaign has demonstrated significant reach and user interaction.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since this malware relies on social engineering via fake CAPTCHA pages and terminal command execution, users should be educated not to run untrusted terminal commands or follow suspicious links from search results. Endpoint protection solutions with macOS malware detection capabilities may help identify and block this threat. Monitoring for indicators of compromise such as the provided hashes and domains can assist in detection. There is no official fix or patch available at this time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
[]
Adversary
null
Pulse Id
69d7ed2e323d7edb856fa161
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5190ef1733183a0dc63fb623357f56d6
hash866993e9950250ac2ce8c3b4c6a8bd39285e0fafd93860f235a3b0370f160dd1
hashb2955c54eb0c047463993b379e015e737aabed37b456aeb0957cf84cdb0ed1f0
hashc56a1b268f358d9fb4d6264932706b53a7347e2544bb5f26355b0c7fc1d299d8

Url

ValueDescriptionCopy
urlhttp://filegrowthlabs.com/s3/?c=AA-
urlhttp://filegrowthlabs.com/s3/?c=AA-0uWlVgQUAHYwCAFVTOQASAAAAAACP
urlhttp://mansfieldpediatrics.com/curl/
urlhttp://mansfieldpediatrics.com/curl/b2955c54eb0c047463993b379e015e737aabed37b456a
urlhttp://mansfieldpediatrics.com/dynamic?txd=b2955c54eb0c047463993b379e015e737aabed
urlhttp://mansfieldpediatrics.com/gate?buildtxd=b2955c54eb0c047463993b379e015e737aab
urlhttps://main.mon2gate.net/modules/wallets
urlhttps://mansfieldpediatrics.com/ledger/b2955c54eb0c047463993b379e015e737aabed37b4
urlhttps://mansfieldpediatrics.com/ledger/live/b2955c54eb0c047463993b379e015e737aabe

Domain

ValueDescriptionCopy
domainfilegrowthlabs.com
domainhoustongaragedoorinstallers.com
domainmansfieldpediatrics.com
domainmain.mon2gate.net

Threat ID: 69d7f1821cc7ad14da06f834

Added to database: 4/9/2026, 6:35:46 PM

Last enriched: 4/9/2026, 6:50:52 PM

Last updated: 4/10/2026, 4:49:38 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses