AI-coded Mac malware is spread via a fake Grok website: Header image
Emerging Threats 6 min read

AI-coded Mac malware is spread via a fake Grok website

Published:Jan 16, 2026

Grok’s security team is having an agitating couple of weeks. Recently, the app, along with ChatGPT, was abused by bad actors to spread macOS malware. Grok was also recently put in the spotlight for allegedly generating, as The New York Times reported, “Sexualized Images of Real People, Fueling Outrage.”

Now, to add more trouble to the AI brand led by Elon Musk, researchers have identified a fake Grok app that behaves just like the real thing. The problem is that it sets up shop on your Mac to mine crypto. Let’s dive in to explore how this new Mac threat works and how to avoid it.

Mosyle finds a sophisticated Grok app with low ambitions

Recently, Mosyle, the Apple-focused security company, shared details on 9to5mac about an app that is pretending to be Grok to use your Mac to mine crypto. The culprit behind this app went through a lot of trouble to breach macOS security. Once inside, the malicious forgery installs a crypto miner, making it a rarity among the Mac malware that we usually report on.

An image of the infrastructure of the malicious site.
This image shows the infrastructure of the site, which pulls resources from the real Grok server. Image: Screenshot, Moonlock.

Beyond what Mosyle shared with 9to5mac, the company did not release any other public information on this threat, as far as we know.

The security research team of Mosyle said that this new Mac-targeting threat was, at the time of their investigation, undetected by all major anti-malware engines. This means that the threat is flying right past most anti-malware apps without raising any alarm whatsoever. 

We did a search on VirusTotal for the website that was distributing this fake Grok app and found that only one anti-malware engine was detecting the threat.

A screenshot of the threat report screen on VirusTotal.
A search on VirusTotal shows that anti-malware companies are not flagging this threat. Image: Screenshot, Moonlock.

Checking the site, we found that the infrastructure of this fake Grok app is apparently still online. However, an error page appears after the website finishes loading. This could mean that threat actors are migrating the fake Grok app from the flagged domain, xaillc[.]com, to other unknown sites and that this campaign is not over yet.

Meet SimpleStealth. Here’s how it works and what you need to know. 

Moslye dubbed this new Mac threat “SimpleStealth.” SimpleStealth works in the following way:

  1. Mac users are directed to a seemingly credible fake Grok site.   
  2. Users download this fake Grok app. 
  3. The Grok app immediately asks the user for the system password as “routine setup.” 
  4. The fake Grok bypasses macOS security, including Gatekeeper. 
  5. Once inside the system, the malware app runs silently in the background. 
  6. The app mines for crypto using your Mac without your knowledge.

While impersonating software and apps to trick users into downloading and installing malware isn’t uncommon, it is noteworthy that this fake Grok app appears to be fully AI functional.

An image of an error screen on the site associated with the fake Grok app.
After loading, the malicious page returns a designed Error message, not an actual error message. The malicious infrastructure appears to still be active behind this message. Image: Screenshot, Moonlock.

How this threat behaves like a Mac stealer

Mac users who have been following cybersecurity news on stealers are one step ahead of this threat. The bad actors are using techniques similar to those used by macOS stealers. By now, these strategies should be familiar to Mac users.

To recap, stealers are known to spread via website downloads on sites designed to impersonate popular brands. Another thing this new macOS malware has in common with stealers is that it goes straight for your system password with the pretense that it needs it for installation. 

All that trouble to install a Monero crypto miner on your Mac? Weird. 

It is rather strange that someone would impersonate a fully functional Grok AI app only to install a hidden Monero (XMR) crypto miner. Daily crypto mining gains for a single Mac running a Monero XMR crypto miner are quite low, almost tiny. A threat actor would need to infect hundreds of thousands of Mac computers with this miner to even make a substantial illegal profit.

Usually, this type of malware, techniques, and capabilities are used to target Mac users’ data and wallets. Moslye’s team did not reveal if this malware is actually doing that. 

An image of the "Check Monero Address" page.
The wallet embedded in the malware resolves as a valid Monero address. Due to Monero’s privacy design, balances and transactions cannot be publicly inspected. Image: Screenshot, Moonlock.

To stay on the safe side, it might be best to assume that if this threat can present to users as a fully functional Grok AI, breach your Mac security, and install a crypto miner on your Mac, it can do other, more dangerous things, like steal your data or install a backdoor.

The miner actually does not run all the time, continually. Mosyle said that to stay hidden, the mining activity only starts when your Mac has been idle for at least a minute and “stops immediately when the user moves the mouse or types. 

“The miner further disguises itself by mimicking common system processes like kernel_task and launchd, making it far harder for users to spot abnormal behavior,” Mosyle said. 

The threat actors are using Monero in this campaign. Unlike Bitcoin, Monero addresses do not expose balances or transaction history, complicating attribution.

An image showing the code of the error screen on the site associated with the fake Grok app.
The site distributing this fake Grok AI app for macOS is loading legitimate X.ai resources (known as parasitic loading, or asset parasitism or trust parasitism). The site also has a Google Manager Tag, which is used to track visits and website traffic analytics when running ads. This means that fake ads could have been used to drive Mac users to this site. Image: Screenshot, Moonlock.

How to stay safe from fake Grok apps and similar threats

The same techniques that apply to any macOS crypto miner, trojan, stealer, or malware apply to SimpleStealth. Here are 3 short but effective tips to stay on top of this and similar threats. 

Try Moonlock. It is updated with the latest threats and shuts down Mac malware. 

The Moonlock antivirus app was built exclusively for Mac and is constantly updated with the latest Mac threats seen in the wild. The Moonlock app runs silently in the background and will make sure every file you interact with is not suspicious.

If Moonlock does find anything shady, it will flag it and move it to Quarantine. In Quarantine, you can check out more information on the threats your Mac encountered and remove them forever when you want, at your own pace. 

You can try out Moonlock for free on a 7-day trial.  

Online ads and limited-use software are constantly pushing users into downloading stuff online. Some of this, we use once or twice. Other times, they don’t even work, and we simply forget to remove them. This isn’t a good habit.

We all want, and sometimes need, functional software. But unfortunately, the days of downloading now and checking tomorrow are gone.

Today, if you are a Mac user, you need to verify everything you install on your Mac, not once or twice but at least three times. Make sure it’s the real thing and comes from a trusted and respected company. 

Watch out for any requests for system passwords or terminal script running

Two ways that malware breaches and accesses your Mac are by requesting system passwords, so check those carefully. It isn’t normal for an app to request your system password, know that too. If it does, it’s likely malware.

Also, be on the lookout for any site, email,  or contact that asks you to copy and paste a script into your terminal. This is not normal behavior either. No app, software, or individual should ask you to paste a script on your terminal without immediately raising a red flag. Learn more about your Mac’s terminal at Apple’s official “Terminal User Guide.”

Final thoughts

This fake Grok AI app is noteworthy for several things. Not only is it part of the new wave of AI impersonation and AI trojan malware, but it is also fully functional. This allows threat actors to run in the background while you’re using the app without ever noticing that something is off. Expect more similar threats to come.

This AI Mac threat comes with a crypto miner, a nasty and annoying piece of malware. In the near future, the next AI Mac Trojan could come with something much worse. Use a strong macOS anti-malware tool and verify everything you download. This can keep you on the safe side.

This is an independent publication, and it has not been authorized, sponsored, or otherwise approved by Apple Inc. Mac and macOS are trademarks of Apple Inc.

MoonLock Banner
Ray Fernandez

Ray Fernandez

Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.