Crypto

A New Trojan Is Hitting ‘Virus-Proof MAC Computers, Stealing Cryptocurrency

A New Trojan Is Hitting 'Virus-Proof MAC Computers, Stealing Cryptocurrency
Follow by Email
WhatsApp
Copy link
URL has been copied successfully!

The MacOS operating system may not be as secure as once thought

A recently discovered Trojan targeting MacOS devices has sparked serious concerns among cryptocurrency users. Known for bypassing Apple’s security and going straight for sensitive data, the malware is built to steal cryptocurrency wallet information within seconds of installation. It relies on a phishing tactic, tricking users into downloading what appears to be legitimate software, yet hides malicious code that exploits administrative permissions to gain deep access into the system.

Once a user downloads the Trojan, it quickly requests their administrator password, which many people often enter without much thought. This password grants the malware broad access, enabling it to modify settings and infiltrate protected folders.

The malware then scans for critical data, including saved passwords, browser cookies, autofill details, and—most crucially—cryptocurrency wallet seed phrases. These seed phrases are essential for accessing cryptocurrency holdings, and if stolen, can lead to immediate or delayed loss of assets, depending on the attacker’s strategy.

The Trojan operates with notable speed, pulling sensitive data from apps like MetaMask and decrypting files either on the user’s device or remotely. Even data stored in iCloud may be vulnerable, highlighting the far-reaching capabilities of this malware. By extracting cookies and login information from users’ browsers, the Trojan can also hijack accounts on popular platforms, like social media and crypto exchanges, allowing hackers to send harmful links or even drain accounts.

The Trojan further compromises communication apps such as Telegram and Discord, which hackers can use to spread malware links to contacts or groups, perpetuating the threat.

For protection, experts recommend avoiding downloads from untrusted sources, particularly when dealing with cryptocurrency. Even initially safe software can become compromised in later updates, so using reputable antivirus software is essential. Being cautious about granting permissions and downloading only from official app stores can provide an added layer of defense against this type of advanced malware.

Secure Banking

Safer Gambling

Our Responsible Gambling program verifies that all players are of legal age and provides customizable self-exclusion tools for our tables, sportsbook, and casino.

AFFILIATE PROGRAM

Maximize your income through our affiliate marketing. Learn more >
Copyright © 2025 | ACRpoker.eu | T&Cs | All Rights Reserved
We use cookies to improve your experience on our site. By continuing to browse, you agree to our use of cookies. Learn More.

Select the software version that is right for your Mac

How to find my chip architecture?