

PSA: 'Atomic macOS Stealer' malware can compromise iCloud Keychain passwords, cr...
source link: https://9to5mac.com/2023/04/28/atomic-macos-stealer-malware-steal-passwords/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

PSA: ‘Atomic macOS Stealer’ malware can compromise iCloud Keychain passwords, credit cards, crypto wallets

Back in March, we saw a piece of malware surface for macOS called MacStealer that’s able to compromise iCloud Keychain passwords, credit card information, files, and more. Now a new malware called Atomic macOS Stealer is being sold as a service to malicious parties that may be more threatening.
This year we’ve seen a report from Malwarebytes covering the state of malware on Mac as well as another study from Elastic Security Labs. In the latter, results showed just 6% of all malware impacted Macs. But even though it’s more likely to affect Windows and Linux, threat actors are actively designing malware specifically for macOS and it’s important to stay diligent.
With the MacStealer malware that we saw in March, it indeed was powerful but is likely a lower risk overall because macOS Gatekeeper should block it from being installed.
Cyble Research & Intelligence Labs (via MacRumors) recently found the new Atomic macOS Stealer (AMOS) malware as it was advertised for sale on Telegram. The threat actor marketing it is regularly updating the malware and is charging $1,000/month for it.
Notably, Cyble didn’t mention macOS Gatekeeper as offering protection for the new AMOS in its technical analysis, so it could prove more dangerous than MacStealer.
What can Atomic macOS Stealer (AMOS) do?
If installed, AMOS can compromise a long list of items including iCloud Keychain passwords; the macOS system password; cookies, passwords, and credit card details from Chrome, Firefox, Brave, Edge, Opera, and more. It can also compromise crypto wallets including Atomic, Binance, Exodus, Electrum, MetaMask, and many more.
The malicious party selling the malware as a service also includes a web panel, Brute MetaMask tool, logs in Telegram with notifications, and more to buyers.
Here is the threat actor pitching the malware on Telegram:

After the malware compromises a user’s information, it compresses the data into a ZIP file and sends it back to the malicious party through a C&C server URL.
Cyble has a detailed breakdown of how the malware works in its post here.
How to stay protected against AMOS and other malware
Cyble also shared a reminder about best practices when it comes to installing apps and broader security habits. While you probably know these, it might be helpful to remind friends and family 😁:
- Download and install software only from the official Apple App Store.
- Use a reputed antivirus and internet security software package on your system.
- Use strong passwords and enforce multi-factor authentication wherever possible.
- Enable biometric security features such as fingerprint or facial recognition for unlocking the device wherever possible.
- Be wary of opening any links received via emails delivered to you.
- Be careful while enabling any permissions.
- Keep your devices, operating systems, and applications updated.
How to check your Mac for malware
If you’re curious to do a checkup on your Mac to make sure there’s no malware or adware, Malwarebytes offers a free app (for individuals) to find and remove it.
Recommend
-
59
README.md Cookie Stealer A cookie stealer disguised as a gif image. Hot to use Host the image.php file wherever you want....
-
13
过去的两个月中,研究人员发现了窃密恶意软件 Poulight Stealer 的技术进化与传播扩散,经过研究发现其可能源于俄罗斯。 介绍 如今,信息窃取是常见的威胁之一,例如 Azorult、Agent Tesla 和 Hawkeye...
-
5
Original text Karsten Hahn Babax not only changes its name but also adds a Ring 3 rootkit and lateral sp...
-
10
Using the OS X Keychain to store and retrieve passwords November 5th, 2015 This document describes how to use the
-
6
PSA: Old passwords can compromise your important accountsI got a surprise last week when a push notification and email came in regarding someone trying to use my Twitch account. The good news here — for me — was that I enabled two-factor auth...
-
12
Secure login with iCloud Keychain verification codes Learn how you can support on-device verification codes in your app or website for a more secure sign-in experience. We'll explore the latest updates to the iCloud Keychain p...
-
3
Password managers — Updated app from Apple brings iCloud Passwords to Windows It's certainly not on par with 1Password, but it's a welcome addition anyway.
-
10
How to Delete Passwords From Keychain Access on macOS By Shujaa Imran Published 19 hours ago You may need to delete Keychain passwords...
-
8
How to Find and Edit Passwords in Keychain Access on a Mac By Shujaa Imran Published 14 hours ago Do you need to find or update a saved...
-
7
Atomic macOS Stealer Malware Can Steal Keychain Info, Files, Browser Wallets and More MacRumors
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK