A deep dive into the growing threat of infostealers targeting macOS, featuring insights from Moonlock Lab researchers on how these attacks are evolving and what users can do to protect themselves.
In the latest episode of the 9to5Mac Security Bite podcast, host Arin Waichulis sits down with Kseniia (@osint_barbie) and Mykhailo (@xor3r) from Moonlock Lab, the cybersecurity research arm of MacPaw, to discuss what they're calling "the meteoric rise of infostealers" as one of the most prolific threats facing Mac users in 2026.

The New Reality for macOS Security
For years, macOS enjoyed a reputation as a relatively secure operating system, with many users believing their devices were immune to the malware and cyberattacks that plagued Windows machines. That perception is rapidly changing, according to the Moonlock Lab researchers.
"The tide has turned for macOS," explains Kseniia. "What we're seeing now is a fundamental shift in how attackers view Apple's ecosystem. As Macs have become more prevalent in both consumer and enterprise environments, they've become increasingly attractive targets."
How Infostealers Are Getting In
The conversation delves into the various attack vectors that infostealers use to compromise Mac systems. Unlike traditional malware that might require sophisticated exploits, modern infostealers often rely on social engineering and legitimate software distribution channels.
"These threats don't always land on your machine through obvious means," says Mykhailo. "We're seeing them distributed through cracked software, fake updates, and even legitimate-looking applications that have been compromised. The attackers have become very sophisticated in their delivery methods."
The Evolution Beyond Simple Theft
What makes today's infostealers particularly concerning is how they've evolved beyond simple data theft. The researchers explain that modern variants can establish persistent backdoors, exfiltrate credentials from browsers and password managers, capture cryptocurrency wallets, and even serve as entry points for more sophisticated attacks.
"It's no longer just a smash-and-grab operation," Kseniia notes. "These infostealers are becoming platforms for broader compromise. Once they're on a system, they can facilitate everything from identity theft to corporate espionage."
The episode also touches on the evolution of specific threats, including how the Mac.c stealer has transformed into MacSync with backdoor capabilities, representing a significant escalation in the sophistication and danger of macOS malware.
What Users Can Do
While the threat landscape is concerning, the researchers emphasize that users aren't helpless. They recommend several practical steps:
- Stay vigilant about software sources: Only download applications from the Mac App Store or directly from developer websites
- Keep systems updated: Install macOS updates promptly, as they often include security patches
- Use reputable security software: Consider dedicated security solutions like Moonlock's offerings
- Be skeptical of unsolicited communications: Phishing remains a primary vector for initial compromise
The Bigger Picture
The rise of infostealers on macOS reflects broader trends in cybersecurity. As Apple devices become more integrated into enterprise environments and as cryptocurrency adoption grows, attackers are following the money and the data.
"We're seeing a convergence of threats," Mykhailo explains. "The same techniques that work on Windows are being adapted for macOS, and attackers are becoming platform-agnostic. They'll go wherever the valuable data is."
What's Next
This episode represents the first part of a two-part conversation, with the second installment scheduled for release on February 15th. The researchers hint at discussing more technical aspects of infostealer operations and emerging defensive strategies in the follow-up episode.
For IT professionals managing fleets of Macs, the implications are particularly significant. The traditional approach of relying on macOS's built-in security features may no longer be sufficient, especially as remote work and bring-your-own-device policies become more common.
Resources and Further Reading
The Security Bite podcast episode is brought to you by Mosyle, the Apple Unified Platform that combines device management with security solutions. For those interested in diving deeper into the topics discussed, the show notes include links to Moonlock's 2025 macOS threat report, information about the Mac.c to MacSync evolution, and resources from the Objective-See non-profit foundation.
You can listen to the full episode on Apple Podcasts, Spotify, Overcast, Pocket Casts, or via RSS feed. The written Security Bite column continues weekly for those who prefer text-based security analysis.
As macOS continues to grow in popularity and enterprise adoption, understanding these evolving threats becomes increasingly critical. The Security Bite podcast aims to bridge the gap between complex security research and practical user knowledge, helping both casual Apple users and IT professionals stay informed about the ever-changing landscape of digital threats.

Comments
Please log in or register to join the discussion