Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
嗯,用户让我帮忙总结一下这篇文章,控制在一百个字以内。首先,我需要仔细阅读文章内容,抓住主要信息。 文章主要讲的是微软警告信息窃取攻击正在迅速扩展到苹果的macOS系统。攻击者利用Python等跨平台语言,并通过可信平台大规模分发恶意软件。他们使用了ClickFix等社会工程学技巧,分发恶意DMG安装程序,部署像AMOS、MacSync和DigitStealer这样的窃取软件。 攻击手段包括无文件执行、原生macOS工具和AppleScript自动化,窃取浏览器凭证、iCloud钥匙串和开发者密钥。攻击通常从恶意广告开始,通过Google广告重定向用户到钓鱼网站。Python基的窃取软件被用于快速适应和重用代码,攻击异构环境。 还有提到PXA窃取软件与越南威胁行为者有关,通过钓鱼邮件传播。攻击链使用注册表Run键或计划任务保持持久性,并使用Telegram进行命令控制和数据外泄。此外,威胁行为者还利用WhatsApp等消息应用分发恶意软件如Eternidade Stealer。 微软建议组织教育用户防范社会工程学攻击,监控可疑终端活动和iCloud钥匙串访问,并检查网络出站POST请求到可疑域名。被窃取软件入侵可能导致数据泄露、未经授权访问内部系统、商业电子邮件诈骗、供应链攻击和勒索软件攻击。 总结时要涵盖关键点:微软警告、macOS为目标、利用Python和可信平台分发、社会工程学技巧如ClickFix、窃取数据类型、Python基的窃取软件优势、PXA案例、Telegram使用、WhatsApp作为传播工具以及建议的防范措施。 现在把这些要点浓缩到100字以内,确保涵盖主要信息。 </think> 微软警告信息窃取攻击正迅速扩展至苹果macOS系统,利用Python等跨平台语言及可信平台大规模分发恶意软件。攻击者通过恶意广告、钓鱼邮件及社交工程学技巧如ClickFix诱导用户安装窃取程序,窃取浏览器凭证、iCloud钥匙串及开发者密钥等敏感数据。 2026-2-4 07:42:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Malvertising / Infostealer

macOS via Fake Ads and Installers

Microsoft has warned that information-stealing attacks are "rapidly expanding" beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.

The tech giant's Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.

The campaigns have been found to use techniques like fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft. This includes details like web browser credentials and session data, iCloud Keychain, and developer secrets.

The starting point of these attacks is often a malicious ad, often served through Google Ads, that redirects users searching for tools like DynamicLake and artificial intelligence (AI) tools to fake sites that employ ClickFix lures, tricking them into infecting their own machines with malware.

"Python-based stealers are being leveraged by attackers to rapidly adapt, reuse code, and target heterogeneous environments with minimal overhead," Microsoft said. "They are typically distributed via phishing emails and collect login credentials, session cookies, authentication tokens, credit card numbers, and crypto wallet data."

One such stealer is PXA Stealer, which is linked to Vietnamese-speaking threat actors and is capable of harvesting login credentials, financial information, and browser data. The Windows maker said it identified two PXA Stealer campaigns in October 2025 and December 2025 that used phishing emails for initial access.

Attack chains involved the use of registry Run keys or scheduled tasks for persistence and Telegram for command-and-control communications and data exfiltration.

In addition, bad actors have been observed weaponizing popular messaging apps like WhatsApp to distribute malware like Eternidade Stealer and gain access to financial and cryptocurrency accounts. Details of the campaign were publicly documented by LevelBlue/Trustwave in November 2025.

Other stealer-related attacks have revolved around fake PDF editors like Crystal PDF that are distributed via malvertising and search engine optimization (SEO) poisoning through Google Ads to deploy a Windows-based stealer that can stealthily collect cookies, session data, and credential caches from Mozilla Firefox and Chrome browsers.

To counter the threat posed by infostealer threats, organizations are advised to educate users on social engineering attacks like malvertising redirect chains, fake installers, and ClickFix‑style copy‑paste prompts. It's also advised to monitor for suspicious Terminal activity and access to the iCloud Keychain, as well as inspect network egress for POST requests to newly registered or suspicious domains.

"Being compromised by infostealers can lead to data breaches, unauthorized access to internal systems, business email compromise (BEC), supply chain attacks, and ransomware attacks," Microsoft said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
如有侵权请联系:admin#unsafe.sh