No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
MAC OSX |
Advisory ID: |
ngCERT-2025-080003 |
Version: |
nil |
CVE: |
CVE-2021-30657, CVE-2022-22616 |
Published: |
September 10, 2025 |
ngCERT is aware of a persistent “AdLoad” malware infiltrating macOS through deceptive installers and bypasses Apple’s native security protections. Once installed, it hijacks browsers, injects unwanted advertisements, and collects user data while embedding itself deeply via launch agents, login items, and configuration profiles to maintain persistence. Detecting AdLoad can be challenging due to its stealthy nature and use of legitimate system mechanisms. Manual detection involves inspecting login items, system profiles, and startup agents, but these methods may miss advanced variants. Proactive monitoring, regular audits, and user education are essential to mitigate risk and protect system integrity. The malware exemplifies the increasing sophistication of macOS threats, making layered defense and timely detection critical to maintaining secure computing environments.
AdLoad is a sophisticated adware targeting macOS, using deceptive installers to penetrate systems unnoticed. It exploits macOS’s native features to establish deep persistence, manipulating browser settings and injecting unsolicited advertisements. Unlike typical malware, AdLoad blends into legitimate system processes, complicating detection efforts. Indicators of infection include unexpected browser redirects, unfamiliar startup items, and subtle system slowdowns. Its stealth is enhanced by employing configuration profiles and launch agents, tools generally used for legitimate purposes. Traditional antivirus tools often struggle to identify AdLoad due to its use of signed components and legitimate macOS mechanisms.
Successful exploitation of Adload malware may lead to the following outcomes:
To mitigate the risks associated with adload malware, ngCERT recommends the following actions: