
Threat actors behind a long-running malvertising campaign impersonating popular investment and trading platforms, such as TradingView, are back with a new trick, targeting macOS users.
As usual, the campaign uses sponsored Facebook ads that promote fake AI and trading apps, including “Sora 2” and “TradingView Desktop,” to deliver a new macOS payload as part of the malvertising campaign that previously targeted Windows and Android users.
Read more about these global malvertising campaigns here:
Bitdefender researchers Andreea Olariu and Ionut Baltariu have tracked two closely related malvertising waves within this ongoing operation:
The first phase impersonated TradingView Desktop and TradingView Premium products. The malicious ads were distributed via Meta and targeted macOS users only, redirecting them to https://tradingview.promo2026[.]com.
The fake website mimicked TradingView’s interface and offered a “Download for macOS” button. Instead of a legitimate installer, the page presented a Base64-encoded terminal command that, once executed, downloaded and launched a malicious script.
These ads were active for a couple of days before Meta removed them.



Days later, the same Meta page started promoting Sora 2, a lure clearly designed to appeal to content creators. The malicious ad directed users to sorachatgpts[.]com
Unlike the TradingView wave, this one targeted both macOS and Windows users:






Despite the cosmetic differences, both waves share identical visual templates, delivery mechanisms, and hosting infrastructure, confirming that they are part of the same coordinated malvertising campaign.
The macOS payload represents a new refinement to this operation. Once the user executes the encoded command, the infection unfolds in multiple layers:
Stage 1 – Loader Script
Downloads and runs a gunzip-encoded shell snippet that retrieves the next payload.
Stage 2 – AppleScript Infostealer
The next-stage script is a full-featured MacSync Stealer, capable of:
The malware also establishes persistence by replacing legitimate crypto-wallet applications like Ledger Live and Trezor Suite with trojanized versions downloaded from the same C2 server.
The updated MacSync Stealer version 1.0.8 is highly aggressive, collecting:
This shows that this campaign isn’t just about traditional credential theft but escalates into full data-exfiltration campaigns that blend infostealers and crypto-drainers.
The operation demonstrates how malvertising has become a preferred delivery vector for cross-platform malware, allowing threat actors to inject fake installers directly into users’ social feeds through paid and “verified” ads.
Although Meta has removed some of the malicious ads, Bitdefender research shows that similar campaigns are likely to reappear under new branding, as the same threat actors continue to adapt their lures.
tags
Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.
View all postsNovember 17, 2025
October 14, 2025