NovaStealer - Apple Intelligence is leaving a plist.. it is legit, right?
Nov. 14, 2025, 12:44 p.m.
Description
A cryptostealer for macOS utilizes a bash-based script to establish persistence and execute malicious modules. The malware installs itself in the ~/.mdrivers directory, uses screen sessions for background execution, and employs a LaunchAgent for persistence. It exfiltrates crypto wallet data, collects system information, and replaces legitimate wallet applications with malicious versions. The threat actor employs clever techniques like using WebKit to render phishing pages and tracking user behavior. While not highly sophisticated, the modular nature and ability to update components remotely make it a noteworthy threat.
Tags
Date
- Created: Nov. 14, 2025, 12:04 p.m.
- Published: Nov. 14, 2025, 12:04 p.m.
- Modified: Nov. 14, 2025, 12:44 p.m.
Indicators
- f3a7ce69a05da9b1faa6323f1ff7c5366d9a155212e391d13faaf84d4f23e20f
- b21c9c5e0a67f7ce3a031d0a6d08926e840af180eb616bee2e54d9c49b2c3da8
- a963b903353ff7027c95e19edb4cb89aa1680ce3d325aae53f78a437056ae8b7
- 8e655bff39e42f6a6f694f481ed476319c54f0595ad33392fc2ff7243f2f2843
- 480e8e46bf171c2ca2e7243386f793d205bc077e0eb9558d64d52ba3f18b96ab
- 470d0df78818cab01970927fa7b076d723530efa4d8bacc580e95e24c2724cd1
- 0f545ef0804f837ee172bdbd37184a48915cac5e8f6cbf5aa310160d2cff5c37
Attack Patterns
- NovaStealer