Atomic Information Thief: Beware! New macOS malware

Atomic Information Thief: Beware! New macOS malware
A new macOS malware, which steals information (info-stealer ) and it’s called ‘Atomic’ (also known as ‘AMOS’), is sold to cybercriminals via private channels on Telegram, for $ 1.000 per month.

Buyers/cybercriminals get one DMG file it contains 64-bit Go-based malware designed to attack macOS systems and steal Keychain Access passwords, local file system files, passwords, cookies, and credit cards stored in the browser. The Atomic malware also steals data from over 50 cryptocurrency extensions.

Additionally, with the $1,000/month subscription, cybercriminals benefit from an out-of-the-box web panel for easy loss management, brute force MetaMaskcryptocurrency checkerdmg installer, and the ability to receive stolen logs on Telegram.

The macOS information stealer was recently discovered by researcher Treillis and his Cyble researchers, who analyzed a sample of the “Atomic” malware and reported that the author had released a new version on April 25, 2023.

The distribution of Atomic macOS malware depends on the cybercriminal who uses it. This can be done through phishing emails, malicious advertisements, through social media posts, etc.

Table of Contents

Atomic macOS Malware

Atomic info-stealer provides a full suite of data-stealing features, which allow for deeper penetration into the target system.

After executing the malicious dmg file, the malware displays a fake password entry window to obtain the system code and take control of the victim’s computer. Thus, the attacker can access sensitive information. However, a future update of the macOS Atomic malware might modify system settings or install additional malicious payloads.

After the first breach, the malware attempts to extract Password Keychain, macOS’s built-in password manager that contains WiFi passwords, website links, credit card data, and other information. encrypted.

See also  Facts About How the Brain Maps to Where we and Others Move Revealed

Atomic Information Thief: Beware! New macOS malware

After doing the above, the Atomic malware proceeds to extract information from software running on the compromised macOS machine, including the following:

System information: model name, hardware UUID, RAM size, number of cores, serial number, etc.

Desktop Cryptocurrency Wallets: Electrum, Binance, Exodus, Atomic

Cryptocurrency wallet extensions: As we said above, more than 50 extensions are affected, including Trust Wallet, Exodus Web3 Wallet, Jaxx Liberty, Coinbase, Guarda, TronLink, Trezor Password Manager, Metamask, Yoroi, and BinanceChain.

Web browser data: Autofill, passwords, cookies, and credit cards from Google Chrome, Mozilla Firefox, Microsoft Edge, Yandex, Opera, and Vivaldi.

The Atomic macOS malware also gives operators the ability to steal files directly from the “ Desktop ” and “ Documents ” directories.

However, malware must request permission to access these files. So, it might help the victims to get aware of the malicious activities.

When stealing data, the Atomic malware will bundle it into a single ZIP file and then send it to the threat actor’s command-and-control server, which Cyble claims is located at “Amos-malware [.]ru/sendlog”.

According to the Trellix researcher, the IP address associated with the threat actor’s command-and-control server and the build name are also used by Raccoon Thief, which indicates a possible link between the two malicious operations.

From there, the selected information and the ZIP file are also sent to the operator’s private Telegram channel.

macOS is often considered more secure than other operating systems. Nevertheless, Threat Actors (TA) have frequently targeted macOS platforms in recent years. In the past, there have been several instances where threat actors have targeted macOS users with various malware families including MacStealer, RustBucket, DazzleSpy, etc. Atomic has now been added.

See also  The Incredible Evolution Of Computing And How It Has Changed Everything Around Us

To protect your Mac device, you need to follow some important steps such as installing antivirus software and updating your system and applications.

Source: www.bleepingcomputer.com

BUZZBONGO

BUZZBONGO  we are here to serve society through a virtual environment that enables people who wish to develop their personal and professional skills in fields related to finance ,administration, business and the economy to share and acquire knowledge.

Leave a Reply