Security researchers have identified a new malware strain named 'Nova Stealer' that is specifically designed to target Apple macOS systems. This information stealer functions as a trojan, replacing legitimate applications with compromised versions to gain execution on a victim's machine. Once active, Nova Stealer scours the file system for cryptocurrency wallet data and other sensitive information, which it then exfiltrates to an attacker-controlled server. The emergence of Nova Stealer is another data point in the growing trend of sophisticated malware development for macOS, signaling that Mac users are increasingly in the crosshairs of cybercriminals.
Nova Stealer employs a classic trojan horse strategy. The attack chain is as follows:
LaunchAgent or LaunchDaemon plist file in /Library/LaunchAgents/ or ~/Library/LaunchAgents/.T1189 - Drive-by Compromise (if downloaded from a malicious site) or T1204.002 - Malicious File.T1204.002 - User Execution: Malicious File.T1543.001 - Create or Modify System Process: LaunchAgent.T1555.003 - Credentials from Web Browsers and T1552.001 - Credentials In Files.T1560 - Archive Collected Data and T1005 - Data from Local System.T1071.001 - Application Layer Protocol: Web Protocols for exfiltration.The primary impact is the direct financial loss from stolen cryptocurrency. Depending on the value stored in the compromised wallets, this could be substantial. Additionally, the theft of browser data, including saved passwords and session cookies, can lead to the compromise of numerous other online accounts, such as email, social media, and financial services. This can result in follow-on attacks, identity theft, and further financial fraud.
No specific Indicators of Compromise (IOCs) like file hashes or C2 domains were provided in the source articles.
M1033 - Limit Software Installation). Avoid third-party aggregators and torrent sites.M1049 - Antivirus/Antimalware).Using a reputable antivirus or EDR solution on macOS can detect and block known malware threats.
Leveraging macOS's built-in Gatekeeper and notarization features prevents the execution of untrusted and unsigned applications.
Educate users to only download software from the official Mac App Store or verified developer websites.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats