Apple devices are considered fairly secure, and that’s what the company tells you. You may have seen the catchphrase “privacy.” With their promotion.
However, the technological landscape is changing, and even Apple products don’t exceed the reach of cybercriminals.
A new report suggests that Mac users need to be more vigilant this year, as advances in AI help hackers violate the safest systems. We have consistently reported on how Mac Malware is targeting users, and experts believe this will only get worse.
Be protected and provide information! Get security alerts and expert technical tips – Sign up for The CyberGuy Report in Cart now

Man working on a laptop (Kurt “Cyberguy” Knutsson)
The rise of cyberattacks on Apple devices
Mac malware is not the old one. For years, the biggest threats have been annoying adware and browser hijackers, which are more annoying than real danger. But it is changing rapidly. As highlighted in MalwareBytes, a new wave of information stealing has taken over, chasing passwords, authentication cookies, credit card details and even cryptocurrency.
The shift began in mid-2023 with the arrival of an Atomic Stealer, also known as Amos. This is malware that looks more like what you see in the window than the typical Mac threat. Amos simply wasn’t effective. It was sold as a service for $1,000 a month using an easy-to-use, sophisticated web-based control panel. Its success led to the rise of even more dangerous variants.
What is Artificial Intelligence (AI)?
One of them, Poseidon, was launched in mid-2024 and became the dominant Mac Stealer, responsible for 70% of infections. You can also eject over 160 different cryptocurrency wallets, steal passwords from your browser and password manager, and get VPN credentials.
At the same time, cybercriminals doubled Malvertising by using fake Google and Bing ads to trick users into downloading malware instead of real software. These campaigns are highly targeted so attackers can identify Mac users and provide fake downloads based on searches. AI is currently used to create and execute many of these attacks, which can increase the scale.

Woman working on a laptop (Kurt “Cyberguy” Knutsson)
4.3 million Americans exposed to a massive health savings account data breaches
Things are getting worse for Android users
Mac malware has evolved, but the situation on Android is even more surprising. Phishing attacks on the platform have reached an astonishing level, with thousands of malicious apps designed to steal credentials and bypass security measures.
So far, in 2024, researchers detected 22,800 phishing-enabled apps, along with 3,900 apps designed to read OTPs from notification bars and 5,200 apps that can extract OTPs from SMS messages. These numbers highlight how broad and effective Android Phishing Malware is expanding.
Just like phishing emails, phishing apps trick users into handing over their username, password and two-factor authentication code. Once stolen, these credentials can be sold or used for fraud, identity theft, or further cyber attacks. Phishing apps have minimal code and less permissions than traditional malware, making it much easier to sneak into the app store, including Google Play.
Many phishing apps look like normal, fully functional software. Some people are pretending to be games or utilities, while others appear as cracked versions of popular apps such as Tiktok, WhatsApp, and Spotify. Some people stay dormant for days to avoid detection before launching an attack. Others rely on advertising features to redirect users to phishing sites, making it difficult to track malicious code.
Google Play Protect, which incorporates malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be sufficient. Historically, it’s not 100% absolutely difficult to remove all known malware from your Android device.
Click here to get your Fox business on the go

Woman working on desktop and laptop computer (Kurt “Cyberguy” Knutsson)
Massive security flaws put the most popular browsers at risk with MAC
5 Tips for Protecting Your Devices from Malware
Follow these important tips to protect your device from the latest malware threats, including the infamous information steeler malware.
1. Have powerful antivirus software: The best way to protect yourself from malicious links to install malware is to access your personal information, so powerful antivirus on all devices It’s about installing the software. This protection can also warn you that it will phish email and ransomware scams and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.
2. Beware of downloads and links: Download only software from reputable sources such as the Mac App Store, Google Play Store, and official websites from trusted developers. Beware of unsolicited emails or messages asking you to download or install the update, especially if it contains a link. Phishing attempts are often hidden in legitimate update notifications or emergency messages.
3. Keep your software up to date: Make sure both MacOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates to address vulnerabilities. Enable automatic updates for MacOS, Android, and apps, leaving them protected without having to check for updates manually. If you need more help, check out our guide to updating all your devices.
4. Use a strong and unique password: To protect your Mac from malware, it is also important to use a strong and unique password for all your accounts and devices. Do not reuse your passwords on various sites and services. A password manager is very useful here. Generate and store complex passwords, making it difficult for hackers to crack.
You also don’t have to remember yourself as you track all your passwords in one location and enter them automatically when you log in to your account. By reducing the number of passwords you need to remember, you are less likely to reuse them and the risk of a security breaches. For more information about my best expert reviewed password managers of 2025, click here.
5. Use 2F (2FA): Enable 2FA for critical accounts such as Apple ID, Google accounts, email, and financial services. This adds additional steps to the login process, allowing attackers to access it even if they have a password.
How to delete private data from the Internet
Important takeouts for your cart
There has long been no longer been a time when Mac users can assume they are safe. Cybercriminals have evolved their tactics, and MAC malware has shifted from simple adware to sophisticated information steelers. Android phishing apps are also becoming more difficult to detect and are becoming more widely used than ever. From theft of passwords and authentication cookies to intercepting OTPs and ejecting cryptocurrency wallets, these threats are growing both on refinement and on scale. The platform is unimmunized, and as cybercriminals continue to improve their techniques, users and organizations must advance strong security measures.
Click here to get the Fox News app
Do you trust official app stores like the App Store and Google Play, or do you think you need to do more to prevent malware? Please let us know at cyberguy.com/contact
For more information about my tech tips and security alerts, head to cyberguy.com/newsletter and subscribe to our free Cyberguy Report Newsletter
Ask us a question in our cart or let us know what you want us to cover
Follow your cart on his social channels
Answers to the most asked Cyber Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.