New 'Nova Stealer' Malware Targets macOS Crypto Wallets

Researchers Discover 'Nova Stealer' Malware Targeting macOS Users to Steal Cryptocurrency Wallets and Sensitive Data

HIGH
November 20, 2025
4m read
MalwareThreat IntelligenceMobile Security

Related Entities

Organizations

Products & Tech

macOS Cryptocurrency

Other

Nova Stealer

Full Report

Executive Summary

Security researchers have identified a new malware strain named 'Nova Stealer' that is specifically designed to target Apple macOS systems. This information stealer functions as a trojan, replacing legitimate applications with compromised versions to gain execution on a victim's machine. Once active, Nova Stealer scours the file system for cryptocurrency wallet data and other sensitive information, which it then exfiltrates to an attacker-controlled server. The emergence of Nova Stealer is another data point in the growing trend of sophisticated malware development for macOS, signaling that Mac users are increasingly in the crosshairs of cybercriminals.


Threat Overview

  • Malware: Nova Stealer
  • Malware Type: Information Stealer / Trojan
  • Target Platform: Apple macOS
  • Primary Objective: Steal cryptocurrency wallets and other sensitive data.
  • Infection Vector: The malware is distributed by trojanizing legitimate applications. Users are likely tricked into downloading these malicious versions from third-party websites, torrents, or through social engineering.

Technical Analysis

Nova Stealer employs a classic trojan horse strategy. The attack chain is as follows:

  1. Distribution: The attacker packages the Nova Stealer payload within a legitimate macOS application and distributes it through unofficial channels.
  2. Execution: The user downloads and runs the trojanized application. The legitimate application may run as expected to avoid suspicion, while the malicious payload executes in the background.
  3. Persistence (Hypothesized): The malware likely establishes persistence to survive reboots, possibly by creating a LaunchAgent or LaunchDaemon plist file in /Library/LaunchAgents/ or ~/Library/LaunchAgents/.
  4. Discovery: The stealer searches for specific files and directories associated with popular cryptocurrency wallets (e.g., Exodus, Electrum, MetaMask browser extension data) and other valuable information like browser cookies, saved passwords, and SSH keys.
  5. Exfiltration: The collected data is compressed and sent to a remote command-and-control (C2) server.

Probable MITRE ATT&CK TTPs:

Impact Assessment

The primary impact is the direct financial loss from stolen cryptocurrency. Depending on the value stored in the compromised wallets, this could be substantial. Additionally, the theft of browser data, including saved passwords and session cookies, can lead to the compromise of numerous other online accounts, such as email, social media, and financial services. This can result in follow-on attacks, identity theft, and further financial fraud.

IOCs

No specific Indicators of Compromise (IOCs) like file hashes or C2 domains were provided in the source articles.

Detection & Response

  • Endpoint Security: Use a reputable endpoint security solution for macOS that can detect and block known malware like Nova Stealer. Look for products that use behavioral analysis to spot suspicious activities, such as an application suddenly accessing sensitive file paths. This aligns with D3FEND's File Analysis (D3-FA).
  • Monitor Network Traffic: Monitor for unexpected outbound connections from unusual processes. If a seemingly benign application is making network connections to an unknown IP address, it warrants investigation.
  • Process Monitoring: Look for suspicious processes running from unexpected locations or applications spawning shell scripts to search the file system.

Mitigation

  • Download from Official Sources: The most effective mitigation is to only download applications from the official Mac App Store or directly from the developer's trusted website (M1033 - Limit Software Installation). Avoid third-party aggregators and torrent sites.
  • Use Gatekeeper: Ensure macOS's Gatekeeper feature is enabled and configured to only allow apps from the App Store and identified developers. This prevents the execution of unsigned or unnotarized code.
  • Endpoint Protection: Install and maintain an up-to-date antivirus or EDR solution for macOS (M1049 - Antivirus/Antimalware).
  • Cold Storage for Crypto: For significant cryptocurrency holdings, use a hardware wallet (cold storage) that is not persistently connected to the computer, making it immune to information-stealing malware.

Timeline of Events

1
November 19, 2025
Security researchers report the discovery of the 'Nova Stealer' malware.
2
November 20, 2025
This article was published

MITRE ATT&CK Mitigations

Using a reputable antivirus or EDR solution on macOS can detect and block known malware threats.

Leveraging macOS's built-in Gatekeeper and notarization features prevents the execution of untrusted and unsigned applications.

Educate users to only download software from the official Mac App Store or verified developer websites.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

macOSMalwareInfoStealerTrojanCryptocurrency

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading