Sunday, August 17, 2025

Safety Chunk: Mac.c is shaking up the macOS infostealer market, rivaling AMOS

9to5Mac Safety Chunk is solely dropped at you by Mosyle, the one Apple Unified Platform. Making Apple gadgets work-ready and enterprise-safe is all we do. Our distinctive built-in method to administration and safety combines state-of-the-art Apple-specific safety options for totally automated Hardening & Compliance, Subsequent Era EDR, AI-powered Zero Belief, and unique Privilege Administration with essentially the most highly effective and trendy Apple MDM in the marketplace. The result’s a very automated Apple Unified Platform at present trusted by over 45,000 organizations to make thousands and thousands of Apple gadgets work-ready with no effort and at an inexpensive price. Request your EXTENDED TRIAL right this moment and perceive why Mosyle is every part you might want to work with Apple.


Since rising to prominence in 2023, AMOS (Atomic macOS Stealer) has grow to be the most infamous infostealer concentrating on the Apple ecosystem. The malware, designed to quietly pull all types of delicate info from macOS methods, is a family title amongst safety researchers, journalists, and possibly even victims.

However now, Moonlock, the cybersecurity division of MacPaw, says it’s been monitoring a brand new risk actor with an infostealer gaining recognition within the veiled corners of darknet boards. On this week’s Safety Chunk, I talk about this fascinating new rising risk and the way it’s shaking up the broader macOS panorama.

Believed to be of Russian origin, the newcomer malware developer goes beneath the alias “mentalpositive,” alongside their product, an infostealer packaged as Mac.c. Whereas mentalpositive has solely been lively for roughly 4 months, “Mac.c is already competing with bigger, extra established stealer operations like Atomic macOS Stealer,” in accordance with Moonlock in a weblog publish for HackerNoon.

Mentalpositive’s extra methodical and unusually clear method to constructing in public seems to be fairly widespread. The malware developer has even shared progress updates and requested for suggestions on earlier Mac.c builds, one thing we hardly ever see within the secretive world of malware growth. We are able to all cross crowdsourced malware off our 2025 bingo playing cards now…

On the technical facet, Mac.c shares code-level similarities with AMOS and Rodrigo4, however it’s been optimized for speedy, high-impact knowledge exfiltration. By trimming down the binary, the malware downloads sooner and leaves fewer static artifacts, making it more durable to detect throughout evaluation. An growing variety of URLs had been additionally discovered being added in every replace, suggesting its command-and-control infrastructure is probably going half of a bigger operation.

“Such publicity could sign an intent to boost visibility and carve out a definite market presence. It additionally seems to put the groundwork for a customized stealer-as-a-service enterprise mannequin aimed squarely on the macOS risk area of interest,” says Moonlock.

Additional, mentalpositive even provides a web-based interface for its clients, the purchasers of the Mac.c infostealer. By way of this panel, consumers can generate customized builds of the stealer (to assist bypass XProtect), monitor an infection statistics (profitable and failed makes an attempt), and handle varied particulars of their campaigns. It reveals every part, however how terrible an individual they’re.

Darknet discussion board screenshot exhibiting an early advert providing a subscription to Mac.c stealer updates for $1,500 per thirty days. through Moonlock.

“The latest publish [from mentalpositive] on the time of writing outlines extra updates,” states Moonlock. “These embody bypassing XProtect by producing distinctive builds from scratch, an expanded listing of supported browsers, file grabber activation through the management panel, and most notably a separate module for phishing Trezor seed phrases.”

Broader macOS risk panorama

Whereas the macOS malware market stays far much less prolific than its Home windows counterpart, the phase is changing into more and more widespread amongst cyber criminals. The reason being easy: recognition. Mac shipments outpaced all PC makers in the US in the course of the last quarter of final 12 months, rising 25.9% year-on-year. Apple’s share of the general pc (non-tablet) market is now round 17.1%, in accordance with analysis agency Canalys.

That is blood within the water. The macOS risk market is more and more changing into profitable for commercially bold malware builders searching for to benefit from new customers coming to the platform. Each enterprise and private Mac customers are falling sufferer at document charges regardless of Apple’s efforts to make it more durable to override Gatekeeper and fortify with XProtect.

As for infostealers particularly, we proceed to see them rocket in recognition for a lot of causes. Infostealers have really overtaken adware because the dominant type of malware, noticed by Jamf, accounting for 28.36% of all Mac malware detected.

Why the rise in recognition?

That is partly because of their accessibility and a low barrier to entry. For instance, cybercriminals like mentalpositive are more and more working Malware-as-a-Service (MaaS) companies. That is the place malware builders create and keep instruments like infostealers and hire them out to associates, these with little technical expertise. Associates get ready-made malware packages to direct at whomever they’d like.

Different contributing elements embody quick payouts over assaults like ransomware, which might take weeks or months earlier than seeing any type of return.

Easy methods to defend towards infostealers

Apple pre-installs many invaluable background companies on each Mac to guard customers from the scary issues that lurk on the web, however typically, these aren’t sufficient.

Whilst you could already know lots of the following pointers, I believe it’s necessary to regurgitate them once more for the plenty.

  • Do your due diligence earlier than putting in something outdoors the official Mac App Retailer
  • Hover over and ensure hyperlinks earlier than opening them
  • Use sturdy, complicated passwords and 2-step authentication (non-SMS if attainable, OTP is greatest)
  • Train warning when granting permissions in your Mac
  • Hold your gadgets and purposes up-to-date

Take a look at Moonlock’s full Mac.c breakdown on HackerNoon right here.

Follow Arin: Twitter/X, LinkedIn, Threads

FTC: We use revenue incomes auto affiliate hyperlinks. Extra.


Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles