Moonlock Lab

macOS malware investigations

Moonlock Lab

Latest threat report

About Moonlock Lab

Moonlock Lab is a team of security engineers that includes a former cybercrime investigator, a white-hat hacker, and a key figure of an Andy Greenberg book. They detect and study cyber threats daily, beefing up the defenses of Moonlock Engine.


Lab’s researchers have discovered new malware samples and AMOS variants, tracked down stealer developers, and exposed sophisticated malvertising campaigns. Their findings amass thousands of views, get featured in Forbes and Bleeping Computer. And when not chasing cyber threats, our experts hit the stage at RSA Webcast, Virus Bulletin, or Objective for the We.

More About Moonlock
About Moonlock Lab

Previous publications

Experts of Moonlock Lab

Follow Moonlock Lab on X

Infostealers aren’t slowing down. Listen to the second part of @9to5mac Security Bite Podcast with @arinwaichulis, where our Moonlock Lab researchers break down how these threats land, and why social engineering is escalating. 🎙️

1/ We just triaged a #macOS sample that looks like a full-featured RAT with a twist - it uses the #Solana blockchain as part of its C2 workflow. Kindly shared by @malwrhunterteam. More below 🧵

Hey!👋 If you appreciate the importance of work done by @osint_barbie from our team, dealing with malware and threat actors, - please go vote for her by sharing a link to her nominee profile @ Cybersecurity Excellence Awards ❤️‍🔥
https://cybersecurity-excellence-awards.com/candidates/kseniia-yamburh-2026/

🧵 1/ 🚨 What if a Google Sponsored result for a common macOS query led to malware? That's happening right now and 15K+ people have already seen it.
We at @MoonlockLab observed 2 variants today abusing legitimate platforms for ClickFix delivery: a @AnthropicAI public artifact on

1/ Crypto #phishing scams against #macOS users become more 'genuine' and continue to target Trezor consumers. Digging deeper on a campaign mentioned by @malwrhunterteam, we followed the trail and examined yet another WebView sample prompting for seed phrase .. 🧵

2

1/ We’re tracking a fresh wave of #Odyssey #Stealer activity targeting #macOS users.
Over the past days, our telemetry showed newly updated samples spreading primarily across:
🇺🇸 United States
🇫🇷 France
🇪🇸 Spain

Today, the picture has clearly changed: the same Odyssey campaign

2

Our team recently published 2026 #macOS malware predictions: supply-chain + AI/workflow (MCP) abuse, signed/notarized stealth & multi-stage loaders, Macs as proxy infrastructure, and “upmarket” infostealers.
Give it a read! 👇

1/ We conducted an analysis on yet undetected + low detected samples of something similar to a dropper/stager written in Go. According to our findings + what has been shared with us kindly by @malwrhunterteam, these files have a few generations with obfuscation in later ones. 🧵

2

Infostealers are no longer a side quest for macOS.
They’re a main storyline.

In Part 1 of the latest @9to5mac Security Bite podcast, Moonlock Lab researchers join @arinwaichulis to discuss why infostealers have emerged as one of the most dominant macOS threats in 2026.

Our

Great convo on macOS infostealers and why “just paste this into Terminal” is never a good life choice 🥲😅

Thank you @arinwaichulis for the great questions and a super nice vibe! Looking forward to Friday🎙️🍏