Microsoft: macOS Infostealers Surge With ClickFix and Python
Microsoft Defender Experts track expanding infostealer campaigns hitting macOS via ClickFix prompts, malicious DMG installers, and Python-based stealers. DigitStealer, MacSync, and AMOS lead the wave.
Microsoft Defender Experts published research this month warning that infostealer malware is aggressively expanding beyond Windows to target macOS environments. The campaigns use ClickFix-style social engineering, malicious DMG installers, and cross-platform Python stealers to harvest credentials, browser data, and cryptocurrency wallets from Apple users.
The shift matters because macOS has historically faced fewer commodity malware threats. That's changing fast.
The macOS Infostealer Landscape
Microsoft's analysis identifies several active malware families targeting Apple systems:
DigitStealer is a JavaScript for Automation (JXA)-based stealer first documented by Jamf Threat Labs in November 2025. It targets 18 cryptocurrency wallets, browser profiles, and macOS keychain data, with particular focus on Apple Silicon devices. Distribution occurs through disk images masquerading as legitimate utilities.
MacSync represents a more sophisticated threat that bypasses Gatekeeper protections through unsigned code loaded into trusted processes. The stealer harvests browser credentials, keychain entries, and cryptocurrency wallet files.
Atomic macOS Stealer (AMOS) continues operating as a malware-as-a-service offering. For $1,000/month, criminals get a turnkey solution for extracting passwords, cookies, and crypto assets from Mac victims. AMOS was behind multiple OpenClaw-related campaigns we've covered recently.
ClickFix Comes to macOS
The ClickFix technique—tricking users into executing malicious commands through fake error messages—has proven devastatingly effective against Windows users. Now it's adapted for macOS.
Microsoft observed campaigns where victims encounter fake verification prompts claiming camera or display configuration issues. The "solution" involves copying a command and pasting it into Terminal. Unlike Windows where PowerShell executes the payload, macOS victims run bash or Python scripts that install stealer components.
The approach works because macOS users aren't conditioned to distrust Terminal commands the way Windows users have (somewhat) learned to question PowerShell prompts. Apple's walled garden reputation creates false confidence that persists even when users manually execute malicious code.
Cross-Platform Python Stealers
A parallel trend involves Python-based stealers that run on any system with a Python interpreter. These tools often target developer machines—environments where Python is guaranteed to exist and where valuable credentials (API keys, cloud access tokens, source code) concentrate.
The Python stealers bypass platform-specific defenses by operating at the interpreter level. They're delivered through trojanized development tools, malicious pip packages, and supply chain compromises affecting npm and PyPI repositories.
Attack Chain Analysis
A typical macOS infostealer infection follows this pattern:
- Initial lure - Victim downloads a DMG file advertised as cracked software, a utility, or a job-related coding test
- Execution prompt - The DMG contains an application that requests Terminal execution or displays ClickFix-style prompts
- Gatekeeper bypass - Various techniques suppress or circumvent Apple's code signing verification
- In-memory execution - Malicious components load without touching disk, avoiding detection
- Data harvesting - Stealer enumerates browser profiles, keychain entries, and cryptocurrency wallet paths
- Exfiltration - Stolen data transmits to attacker C2 infrastructure
The infection chain exploits user trust rather than software vulnerabilities. Every step requires victim cooperation, but social engineering makes that cooperation routine.
Who's at Risk
Cryptocurrency holders face the highest risk. Every macOS stealer Microsoft analyzed prioritizes wallet extraction. Browser credentials rank second—valuable for account takeover but less immediately monetizable.
Developers represent a secondary target category. Their machines contain API tokens, cloud credentials, and access to source code repositories. A single compromised developer can cascade into organization-wide supply chain attacks.
Home users who believe "Macs don't get viruses" remain the softest targets. The myth persists despite years of evidence to the contrary, and attackers exploit this misconception through social engineering that wouldn't work against more security-aware populations.
Defensive Measures
Microsoft's research suggests practical mitigations:
- Never paste commands from websites into Terminal - This is 2026's equivalent of enabling macros in Word documents
- Verify DMG sources - Legitimate software comes from official sources, not download aggregators
- Enable Gatekeeper strictly - Don't disable security features for "convenience"
- Review browser extension permissions - Stealers often arrive through malicious browser extensions
- Use hardware wallets - Keep significant cryptocurrency holdings off internet-connected devices
The broader lesson is that platform security doesn't protect against social engineering. macOS may have fewer remote exploits than Windows, but that advantage disappears when users willingly execute malicious code. As infostealers evolve to target AI agent configurations, the attack surface continues expanding regardless of operating system.
Related Articles
Attackers Weaponize ClawHub Comments to Deliver Infostealers
Threat actors bypass ClawHub security by hiding Base64 payloads in fake troubleshooting comments. Atomic Stealer delivered to unsuspecting OpenClaw users.
Feb 24, 2026341 Malicious OpenClaw Skills Distribute Atomic Stealer
Security researchers uncover ClawHavoc campaign distributing Atomic Stealer through fake cryptocurrency and productivity tools on ClawHub marketplace.
Feb 3, 2026MacSync Stealer Bypasses macOS Gatekeeper Using Apple's Own Notarization
New variant distributed as signed and notarized Swift app evades built-in security. Jamf Threat Labs traces evolution from ClickFix techniques to silent installer approach.
Dec 29, 2025CrashFix Malware Crashes Browsers to Trick Enterprise Users
Microsoft warns of ClickFix variant that deliberately crashes Chrome, then social-engineers victims into running PowerShell. Only domain-joined hosts targeted.
Feb 15, 2026