By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
Computing

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

News Room
Last updated: 2026/02/04 at 3:42 AM
News Room Published 4 February 2026
Share
Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
SHARE

Ravie LakshmananFeb 04, 2026Malvertising / Infostealer

Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.

The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.

The campaigns have been found to use techniques like fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft. This includes details like web browser credentials and session data, iCloud Keychain, and developer secrets.

The starting point of these attacks is often a malicious ad, often served through Google Ads, that redirects users searching for tools like DynamicLake and artificial intelligence (AI) tools to fake sites that employ ClickFix lures, tricking them into infecting their own machines with malware.

“Python-based stealers are being leveraged by attackers to rapidly adapt, reuse code, and target heterogeneous environments with minimal overhead,” Microsoft said. “They are typically distributed via phishing emails and collect login credentials, session cookies, authentication tokens, credit card numbers, and crypto wallet data.”

One such stealer is PXA Stealer, which is linked to Vietnamese-speaking threat actors and is capable of harvesting login credentials, financial information, and browser data. The Windows maker said it identified two PXA Stealer campaigns in October 2025 and December 2025 that used phishing emails for initial access.

Attack chains involved the use of registry Run keys or scheduled tasks for persistence and Telegram for command-and-control communications and data exfiltration.

In addition, bad actors have been observed weaponizing popular messaging apps like WhatsApp to distribute malware like Eternidade Stealer and gain access to financial and cryptocurrency accounts. Details of the campaign were publicly documented by LevelBlue/Trustwave in November 2025.

Other stealer-related attacks have revolved around fake PDF editors like Crystal PDF that are distributed via malvertising and search engine optimization (SEO) poisoning through Google Ads to deploy a Windows-based stealer that can stealthily collect cookies, session data, and credential caches from Mozilla Firefox and Chrome browsers.

To counter the threat posed by infostealer threats, organizations are advised to educate users on social engineering attacks like malvertising redirect chains, fake installers, and ClickFix‑style copy‑paste prompts. It’s also advised to monitor for suspicious Terminal activity and access to the iCloud Keychain, as well as inspect network egress for POST requests to newly registered or suspicious domains.

“Being compromised by infostealers can lead to data breaches, unauthorized access to internal systems, business email compromise (BEC), supply chain attacks, and ransomware attacks,” Microsoft said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Astro Announces Version 6 Beta with Redesigned Development Server and First-Class Cloudflare Workers Astro Announces Version 6 Beta with Redesigned Development Server and First-Class Cloudflare Workers
Next Article Best Apps to Identify Callers and Stop Spam Calls Best Apps to Identify Callers and Stop Spam Calls
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The European offensive against encrypted phone evidence | Computer Weekly
The European offensive against encrypted phone evidence | Computer Weekly
News
States race forward on education AI regulations despite Trump objections
States race forward on education AI regulations despite Trump objections
News
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
Computing
Name that tune! Spotify may soon get a new music-guessing game
Name that tune! Spotify may soon get a new music-guessing game
News

You Might also Like

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
Computing

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

5 Min Read
Payments are becoming Nigerian banks’ growth lever, says S&P
Computing

Payments are becoming Nigerian banks’ growth lever, says S&P

6 Min Read
The Next Generation of Cybersecurity Protection for Healthcare | HackerNoon
Computing

The Next Generation of Cybersecurity Protection for Healthcare | HackerNoon

6 Min Read
One Line Fix Coming For Achieving Better Linux Performance On The HP OMEN 8E41 Laptop
Computing

One Line Fix Coming For Achieving Better Linux Performance On The HP OMEN 8E41 Laptop

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?