Moonlock Lab

macOS malware investigations

Moonlock Lab

Latest threat report

About Moonlock Lab

Moonlock Lab is a team of security engineers that includes a former cybercrime investigator, a white-hat hacker, and a key figure of an Andy Greenberg book. They detect and study cyber threats daily, beefing up the defenses of Moonlock Engine.


Lab’s researchers have discovered new malware samples and AMOS variants, tracked down stealer developers, and exposed sophisticated malvertising campaigns. Their findings amass thousands of views, get featured in Forbes and Bleeping Computer. And when not chasing cyber threats, our experts hit the stage at RSA Webcast, Virus Bulletin, or Objective for the We.

More About Moonlock
About Moonlock Lab

Previous publications

Experts of Moonlock Lab

Follow Moonlock Lab on X

1/ℹ️We found a fully-featured macOS #RAT that zero AV vendors detected at the time of discovery.

Meet "3Crypt RAT/C2 Capability Tester" - a #macOS binary with deep recon, persistence, evasion, and lateral movement capabilities.

No real C2 infra. But don't let that fool you. 👇

Ever seen a malware dev just… come back?

A known macOS threat actor resurfaced under a new identity — now behind a stealer called notnullOSX.

It’s already active, evolving, and targeting high-value data.

Feels like macOS threats are getting a lot more persistent lately.

🔴1/ We've spotted in-the-wild usage of #Overlord RAT - a Go-based remote access trojan targeting #macOS.
Binary was found and shared by @malwrhunterteam.
First detections: South Korea.
This one has HVNC, process injection and browser hijacking capabilities. More below 👇

New research from our friends/supporters @MacPaw / @moonlock_lab 👏

🍎👾🔬 New macOS stealer “notnullosx”: Go-based, modular, and going after everything from browser creds to crypto wallets.

Read:

1/ A trusted package with massive reach briefly became a malware delivery channel, and we’re currently tracking a spike in #Waveshaper across 19 countries, including the US, Canada, Australia, and parts of Asia.
The recent Axios npm compromise shows how a single supply-chain

Kseniia Yamburh @osint_barbie has been named “Cybersecurity Woman of the Year” at the 2026 Cybersecurity Excellence Awards!
As a Malware Research Engineer at Moonlock by MacPaw, Kseniia spends her days hunting down macOS threats and sharing her intelligence with the broader

1/ New #macOS samples, 0 detections on VT as of writing, but multiple artifacts suggest Sliver-like HTTP(S) C2. Shared by @malwrhunterteam.
What stood out: procedural URL patterns, PNG-wrapped network payloads, no plaintext IOCs, and wazero/WASM-related execution. More below👇

We’re excited to share something special with the community.

Moonlock Lab experts @osint_barbie and @xor3r have published a new piece on the RSA Conference blog about the evolving landscape of macOS threats.

In the article they break down the most common threats targeting macOS

Beware fake VCs on LinkedIn ❗️
Our latest Moonlock Lab report tracks a new #ClickFix campaign using fake Zoom/Meet links + a bogus Cloudflare CAPTCHA to trick victims into pasting malicious commands - cross-platform for macOS & Windows.
Featuring findings by @malwrhunterteam and

Infostealers aren’t slowing down. Listen to the second part of @9to5mac Security Bite Podcast with @arinwaichulis, where our Moonlock Lab researchers break down how these threats land, and why social engineering is escalating. 🎙️

1/ We just triaged a #macOS sample that looks like a full-featured RAT with a twist - it uses the #Solana blockchain as part of its C2 workflow. Kindly shared by @malwrhunterteam. More below 🧵