Moonlock Lab

macOS malware investigations

Moonlock Lab

Latest threat report

About Moonlock Lab

Moonlock Lab is a team of security engineers that includes a former cybercrime investigator, a white-hat hacker, and a key figure of an Andy Greenberg book. They detect and study cyber threats daily, beefing up the defenses of Moonlock Engine.


Lab’s researchers have discovered new malware samples and AMOS variants, tracked down stealer developers, and exposed sophisticated malvertising campaigns. Their findings amass thousands of views, get featured in Forbes and Bleeping Computer. And when not chasing cyber threats, our experts hit the stage at RSA Webcast, Virus Bulletin, or Objective for the We.

More About Moonlock
About Moonlock Lab

Previous publications

Experts of Moonlock Lab

Follow Moonlock Lab on X

🔎 Seems like #Odyssey #macOS stealer crossed our upper tolerance band for the average detection rate on Nov 1st, indicating an active campaign.
Geography suggests the spread is global, with visible clusters in India, the US, APAC, and parts of Europe.

Missed our latest…

2

1/ Sometimes the best hunts start with a simple share. A few strings from an updated #MacSync #macOS malware, dropped casually by @g0njxa, led us to the FUD file, which appears to be a dropper 👇

It's amazing to see our work come to life!
At Moonlock Lab, we dig deep into macOS malware. Now, with the Moonlock app by @MacPaw, that deep technical insight is turning into real, easy-to-use security for everyone. We hope you feel safer! 🔒

cc @patrickwardle @g0njxa @arinwaichulis @philofishal @L0Psec @shablolForce @theevilbit @theJoshMeister @DefSecSentinel @bruce_k3tta @birchb0y @RussianPanda9xx @txhaflaire @AndreGironda @500mk500 @suyog41 @NietzscheLab

1/ Recently @malwrhunterteam shared an interesting sample with our team, which we initially didn’t believe to be such a rabbit hole. However, it turned out to be a multi-staged, crossplatform, and likely targeted #DPRK campaign. During our research we also highlighted some…

Seems like #crypto #phishing won’t go away anytime soon .. A few days ago our team found a (yet) undetected sample on VirusTotal, and decided to tell you more about it 🔍

The sample itself does not contain any significantly malicious functions except for showing some web-loaded…

3

A few days ago our team started a minor research around the domains used by #Odyssey #stealer. The one we would like to highlight today is franceparfumes[.]org, also mentioned by @suyog41.

It caught our attention because of an unusual name, which hints to either a previously…

4

Today we are having fun tackling Mac malware with the boss @patrickwardle 🫡😍
#OBTS v8.0

@objective_see 🫶

🕵️macOS threats are leveling up! The rebranded MacSync Stealer (formerly mac.c by “mentalpositive”) has moved to a stealthy, Go-based backdoor, quieter than AMOS, enabling full remote control beyond mere data theft.
See details on hands-on-keyboard remote control on macOS…

1/7: Huge kudos to Mosyle for the original catch and to @9to5mac for spreading the word (http://bit.ly/4lZHfK2). Our Lab couldn't help but hunt related JSCoreRunner activity, and we (sadly) saw multiple hits among our users. Our heat map shows the most impact in the US and UK.