Microsoft Warns of Python-Based Infostealers Targeting macOS via Ads and Fake Installers

Microsoft Alerts: Python-Based Infostealers Now Targeting macOS Users

In a significant development, Microsoft has raised alarms about a surge in information-stealing attacks that are now extending beyond Windows systems to infiltrate Apple macOS environments. Cybercriminals are leveraging cross-platform programming languages like Python and exploiting trusted platforms to distribute malware on a large scale.

The Defender Security Research Team at Microsoft has been monitoring these macOS-targeted infostealer campaigns since late 2025. These campaigns employ sophisticated social engineering techniques, notably the ClickFix method, to distribute disk image (DMG) installers. Once executed, these installers deploy various stealer malware families, including Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.

These malicious campaigns utilize advanced tactics such as fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft. The stolen information often includes web browser credentials, session data, iCloud Keychain contents, and sensitive developer secrets.

The Attack Vector: Malicious Advertising

A common entry point for these attacks is through malicious advertisements, particularly those served via Google Ads. Unsuspecting users searching for tools like DynamicLake or various artificial intelligence (AI) applications are redirected to counterfeit websites. These sites employ ClickFix lures, deceiving users into downloading and installing malware onto their systems.

The Role of Python-Based Stealers

Microsoft highlights that attackers are increasingly utilizing Python-based stealers due to their adaptability and ease of code reuse. These stealers can target diverse environments with minimal effort. Typically distributed through phishing emails, they are designed to collect a wide range of sensitive information, including login credentials, session cookies, authentication tokens, credit card numbers, and cryptocurrency wallet data.

Case Study: PXA Stealer

One notable example is the PXA Stealer, linked to Vietnamese-speaking threat actors. This malware is capable of harvesting login credentials, financial information, and browser data. Microsoft identified two significant PXA Stealer campaigns in October and December of 2025, both of which utilized phishing emails as the initial attack vector.

The attack chains associated with PXA Stealer involve the use of registry Run keys or scheduled tasks to maintain persistence on the infected system. Additionally, the malware employs Telegram for command-and-control communications and data exfiltration, allowing attackers to manage and extract stolen information remotely.

Exploitation of Messaging Apps

Cybercriminals have also been observed weaponizing popular messaging applications like WhatsApp to distribute malware such as Eternidade Stealer. This strategy enables attackers to gain unauthorized access to financial and cryptocurrency accounts. Details of these campaigns were publicly documented by LevelBlue/Trustwave in November 2025.

Malvertising and Fake Software Installers

Another prevalent method involves the distribution of fake software installers through malvertising and search engine optimization (SEO) poisoning. For instance, counterfeit PDF editors like Crystal PDF are promoted via Google Ads. When users download and install these fake applications, they unwittingly deploy Windows-based stealers that clandestinely collect cookies, session data, and credential caches from browsers such as Mozilla Firefox and Google Chrome.

Mitigation Strategies

To counter the growing threat posed by infostealers, organizations and individuals are advised to implement several proactive measures:

1. User Education: Educate users about social engineering attacks, including malvertising redirect chains, fake installers, and ClickFix-style copy-paste prompts. Awareness is a critical first line of defense.

2. Monitoring Terminal Activity: Regularly monitor for suspicious Terminal activity and unauthorized access to the iCloud Keychain. Unusual behavior in these areas can be indicative of a compromise.

3. Network Inspection: Inspect network egress for POST requests to newly registered or suspicious domains. Such activity can signal data exfiltration attempts.

Microsoft emphasizes that being compromised by infostealers can lead to severe consequences, including data breaches, unauthorized access to internal systems, business email compromise (BEC), supply chain attacks, and ransomware incidents.

Conclusion

The expansion of Python-based infostealers into macOS environments underscores the evolving nature of cyber threats. As attackers continue to adapt and exploit cross-platform capabilities, it is imperative for users and organizations to remain vigilant, educate themselves on emerging threats, and implement robust security measures to protect sensitive information.