6 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
This article reviews new macOS malware discovered in 2025, detailing infection methods, persistence techniques, and the functionality of each specimen. The focus is primarily on information stealers, highlighting their rise in prevalence and the tactics used to distribute them. It also provides links to malware samples for analysis.
If you do, here's more
In 2025, the landscape of macOS malware continued to evolve, with a notable rise in information stealers, which focus on collecting sensitive data such as passwords, cookies, and cryptocurrency wallets. Patrick Wardle's analysis compiles all new macOS malware from the year, categorizing it by type rather than by the month of discovery. This shift reflects the growing complexity and volume of threats targeting macOS, driven by its increasing market shareβup 60 percent over three years. The piece emphasizes the urgency of understanding these threats, especially as predictions suggest macOS could dominate enterprise environments by 2030.
The report details various new malware samples, starting with the Kitty Stealer, which captures Chrome data and cryptocurrency information. Its development status was still in progress when discovered, leading to questions about its infection vector. The article also touches on the "Malware-as-a-Service" model, where malware authors sell their creations, while independent teams handle distribution through methods like fake updates and malvertising. Wardle's analysis includes links to public samples for further investigation, providing a resource for those interested in malware analysis.
Tools used for the analysis are highlighted, such as ProcessMonitor and Hopper Disassembler, which help researchers dissect malware behavior. The report serves as a technical reference, ensuring that readers are equipped with knowledge about the latest macOS threats and the methods used to combat them.
Questions about this article
No questions yet.