Cyber Security News

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site

Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website. 

This malware-as-a-service (MaaS) operation employs advanced social engineering tactics combined with anti-analysis techniques to compromise sensitive user data, marking a significant escalation in macOS-targeted threats.

The attack chain begins with malvertising campaigns redirecting users to deepseek.exploreio[.]net, a domain hosting a near-perfect replica of the legitimate DeepSeek AI interface. 

Upon clicking “Download for Mac OS,” victims receive a DMG file named DeepSeek_v.[0-9].[0-9]{02}.dmg from the compromised domain manyanshe[.]com.

Fake DeepSeek site

The mounted DMG contains a malicious shell script masquerading as an application bundle:

This multi-stage payload leverages osascript to execute AppleScript commands that bypass macOS Gatekeeper protections by forcing execution through Terminal. 

The script copies a binary named .DeepSeek to /tmp, clears extended attributes with xattr -c, and marks it executable via chmod +x.

Anti-Analysis and Evasion Techniques

Poseidon Stealer implements layered anti-debugging measures, a secondary check uses sysctl to inspect the P_TRACED flag in process status.

Anti-debug via ptrace()

The malware terminates if usernames match common researcher aliases like “maria” or “jackiemac” through AppleScript validation. 

Post-execution, it runs disown; pkill Terminal to detach from the parent process and remove forensic artifacts.

Data Exfiltration Mechanisms

Poseidon harvests:

  • Chromium/Firefox credentials (cookies, passwords, credit cards)
  • Cryptocurrency wallet data from 127 targeted extensions including MetaMask (nkbihfbeogaeaoehlefnkodbefgpgknn) and Coinbase Wallet (hnfanknocfeofbddgcijnmhnfnkdnaad)
  • System keychain databases (/Library/Keychains/login.keychain-db)
  • Documents matching *.txt, *.pdf, *.wallet extensions
Harvested files ready for exfil

According to the Report, A forged password dialog validates credentials before zipping stolen data. Exfiltration occurs via curl POST requests to the C2 at 82.115.223[.]9/contact.

Mitigation Strategies

eSentire’s TRU team recommends:

  • Restricting osascript execution through MDM policies
  • Implementing NGAV solutions to detect and contain threats
  • User education on Terminal-based execution risks

This campaign demonstrates attackers’ growing sophistication in bypassing macOS security controls. 

The combination of social engineering, multi-stage payloads, and extensive data harvesting capabilities positions Poseidon Stealer as a critical threat to organizational and individual macOS users alike.

eSentire confirms active containment of infections across multiple enterprise networks, with ongoing monitoring for related IoCs.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

34 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

3 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

13 hours ago