{"id":2843,"date":"2026-05-01T20:04:32","date_gmt":"2026-05-01T20:04:32","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/"},"modified":"2026-05-01T20:04:32","modified_gmt":"2026-05-01T20:04:32","slug":"malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/","title":{"rendered":"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)"},"content":{"rendered":"<div>\n<p><em><strong>Introduction<\/strong><\/em><\/p>\n<p>As macbooks and mac minis become more popular, we&#8217;re seeing more campaigns targeting these macOS hosts. Malicious ads have popped up in search results that can lead potential victims to pages that present themselves as legitimate malware but instead are malware. This diary presents one such example from a malicious ad for a page that impersonates Homebrew we saw on Thursday, 2026-04-30.<\/p>\n<p>Homebrew is a third-party package manager for macOS, and this page pushes MacSync Stealer malware. As I write this today (2026-05-01), the fake Homebrew page at\u00a0<span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/sites.google[.]com\/view\/brewpage<\/span> is still active.<\/p>\n<p><em><strong>Images<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Malicious ad in search results leading to fake Homebrew page.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-02.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-02a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Information about the advertiser for the malicious ad.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-03.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-03a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Fake Homebrew page with script to copy\/paste for potential victims to download malware.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-04.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-04a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Script from fake Homebrew page pasted to a terminal window on a macOS host.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-05.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-05.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: After running the script, this popup appears, and it collects the victim&#8217;s password.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-06.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-06.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: After running the entering the password, this popup appears for the Terminal app to access the Finder app in macOS.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-07.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-07.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: This is the final popup that appears after running the script.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-08.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-08a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: During the infection, MacSync Stealer collects information from the host, temporarily saves it to <span style=\"font-family:Courier New,Courier,monospace;\">\/tmp\/osalogging.zip<\/span> and sends that file to the C2 server.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-09.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-09a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Traffic from the infection filtered in Wireshark.<\/em><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-10.png\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-10a.png\" style=\"border-width: 2px; border-style: solid;\"><\/a><br \/>\n<em>Shown above: Traffic from the infected host sending the\u00a0<span style=\"font-family:Courier New,Courier,monospace;\">\/tmp\/osalogging.zip<\/span> file to the C2 server.<\/em><\/p>\n<p><em><strong>Indicators of Compromise<\/strong><\/em><\/p>\n<p>Example of URL from malicious ad:<\/p>\n<p style=\"margin-left: 40px;\"><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/www.google[.]com\/aclk?sa=L&amp;<br \/>\nai=DChsSEwi24vK_v5aUAxXZS38AHRAFIWAYACICCAIQABoCb2E&amp;<br \/>\nco=1&amp;<br \/>\ngclid=EAIaIQobChMItuLyv7-WlAMV2Ut_AB0QBSFgEAMYASAAEgKrq_D_BwE&amp;<br \/>\ncid=CAASugHkaEZtQvhFJBWvSVo_oMtlq6lKBxptjJBacaXOdzM28vxFNm3V2vrefacF48NMD0YvBIV9PCmn_d6X0uiMYDt5bwJYXaT6Lt7Mf3F-Mc3OK-0ugNt4GfcvQ0lOKkP1Sf8WVDXTMPeVMsHE8qxoG43Ta5BRER_Sre0RfChP39oVqtwRkowlKUUojM12uBAYWvejqokVOa_j7-uGyN1XrQ1ae6Tfaijfc9OvMC9QKQovm7p0DBitWtBJ_d4&amp;<br \/>\ncce=1&amp;<br \/>\nsig=AOD64_2EqeARnVjOoYvCwtJyl1AsolQe7g&amp;q&amp;<\/span><br \/>\n<span style=\"font-family:Courier New,Courier,monospace;\">adurl&amp;<br \/>\nved=2ahUKEwjyq-2_v5aUAxU3g2oFHc28JOUQ0Qx6BAhnEAE<\/span><\/p>\n<p>Example of fake Homebrew site URL:<\/p>\n<p style=\"margin-left: 40px;\"><span style=\"font-family:Courier New,Courier,monospace;\">hxxps[:]\/\/sites.google[.]com\/view\/brewpage?gad_source=1&amp;<br \/>\ngad_campaignid=23806351087&amp;<br \/>\ngbraid=0AAAAACJ6-Kb3hWjjAWCyYLIj0YO5oQvtp&amp;<br \/>\ngclid=EAIaIQobChMItuLyv7-WlAMV2Ut_AB0QBSFgEAMYASAAEgKrq_D_BwE<\/span><\/p>\n<p>Domain used by C2 server for the MacSync infection:<\/p>\n<p style=\"margin-left: 40px;\"><span style=\"font-family:Courier New,Courier,monospace;\">glowmedaesthetics[.]com<\/span><\/p>\n<p>Files from the infection:<\/p>\n<p>SHA256 hash: <a href=\"https:\/\/www.virustotal.com\/gui\/file\/a4fcfecc5ac8fa57614b23928a0e9b7aa4f4a3b2b3a8c1772487b46277125571\"><span style=\"font-family:Courier New,Courier,monospace;\">a4fcfecc5ac8fa57614b23928a0e9b7aa4f4a3b2b3a8c1772487b46277125571<\/span><\/a><\/p>\n<ul style=\"margin-left: 40px;\">\n<li>File size: 225 bytes<\/li>\n<li>File type: ASCII text, with no line terminators<\/li>\n<li>File description: Copy\/paste script from the fake Homebrew page.<\/li>\n<\/ul>\n<p>SHA256 hash: <a href=\"https:\/\/www.virustotal.com\/gui\/file\/0d58616c750fc8530a7e90eee18398ddedd08cc0f4908c863ab650673b9819dd\"><span style=\"font-family:Courier New,Courier,monospace;\">0d58616c750fc8530a7e90eee18398ddedd08cc0f4908c863ab650673b9819dd<\/span><\/a><\/p>\n<ul style=\"margin-left: 40px;\">\n<li>File size: 1,448 bytes<\/li>\n<li>File type: Paul Falstad&#8217;s zsh script text executable, ASCII text<\/li>\n<li>File location: <span style=\"font-family:Courier New,Courier,monospace;\">hxxp[:]\/\/glowmedaesthetics[.]com\/curl\/63810ee8b478575f3b2c6c46160c1fd338b213c6fc11bb0069dac9bbb7db237d<\/span><\/li>\n<li>File description: Initial download from the copy\/paste script<\/li>\n<\/ul>\n<p>SHA256 hash: <a href=\"https:\/\/www.virustotal.com\/gui\/file\/86d0c50cab4f394c58976c44d6d7b67a7dfbbb813fbcf622236e183d94fd944f\"><span style=\"font-family:Courier New,Courier,monospace;\">86d0c50cab4f394c58976c44d6d7b67a7dfbbb813fbcf622236e183d94fd944f<\/span><\/a><\/p>\n<ul style=\"margin-left: 40px;\">\n<li>File size: 2,647 bytes<\/li>\n<li>File type: Paul Falstad&#8217;s zsh script text executable, ASCII text<\/li>\n<li>File description: Shell script extracted from base64 text in the initial download<\/li>\n<\/ul>\n<p>&#8212;<br \/>\nBradley Duncan<br \/>\nbrad [at] malware-traffic-analysis.net<\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction As macbooks and mac minis become more popular, we&#8217;re seeing more campaigns targeting these macOS hosts. Malicious ads have popped up in search results that can lead potential victims to pages that present themselves as legitimate malware but instead are malware. This diary presents one such example from a malicious ad for a page [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-2843","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Introduction As macbooks and mac minis become more popular, we&#8217;re seeing more campaigns targeting these macOS hosts. Malicious ads have popped up in search results that can lead potential victims to pages that present themselves as legitimate malware but instead are malware. This diary presents one such example from a malicious ad for a page [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T20:04:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)\",\"datePublished\":\"2026-05-01T20:04:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\"},\"wordCount\":582,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\",\"name\":\"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png\",\"datePublished\":\"2026-05-01T20:04:32+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage\",\"url\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png\",\"contentUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/","og_locale":"en_US","og_type":"article","og_title":"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) - Imperative Business Ventures Limited","og_description":"Introduction As macbooks and mac minis become more popular, we&#8217;re seeing more campaigns targeting these macOS hosts. Malicious ads have popped up in search results that can lead potential victims to pages that present themselves as legitimate malware but instead are malware. This diary presents one such example from a malicious ad for a page [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-01T20:04:32+00:00","og_image":[{"url":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)","datePublished":"2026-05-01T20:04:32+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/"},"wordCount":582,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/","name":"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png","datePublished":"2026-05-01T20:04:32+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#primaryimage","url":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png","contentUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/2026-04-30-image-MacSync-Stealer-image-01a.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/01\/malicious-ad-for-homebrew-leads-to-macsync-stealer-fri-may-1st\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2843"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2843\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}