Watch your DMGs!

This appropriately named malware - MacStealer - certainly has a "mal" intent. It seeks to steal data from Intel M1/M2 chip Apple devices running Catalina or later OS which can include keychain info (account passwords), documents etc.

But, not surprisingly, Mac targeting is on the rise as EU population has increased.
So, don't be careless for what you install or what you click on!

To quote a segment from the (short) article link below...

"The bad actor uses a .DMG file to spread the malware. After a user executes the file, it opens a fake password prompt," Uptycs researchers explained in the post. "Once the user enters their login credentials, the stealer … [compresses] the data and sends it to C2 via a POST request using a Python User-Agent request. It deletes the data and ZIP file from the victim's system during a subsequent mop-up operation."

( note: there may be an ad on the opening page of this link - as well as a now common prompt for cookies.
You can bypass the Ad in the top right corner and read freely after that)

Bushels of Data Plucked

Comments and articles posted or linked here are for your interest only. We do not make any claims as to their absolute accuracy or their source.
Please check with the respective poster should you have questions of that nature.