Hackers selling macOS malware on Telegram which extracts personal info

Threat actors are selling a new malware called -- Atomic macOS Stealer (AMOS) on Telegram channel to target macOS platforms, which is capable of extracting autofill information, passwords and wallets

Macbook
IANS San Francisco
2 min read Last Updated : May 01 2023 | 2:12 PM IST

Threat actors are selling a new malware called -- Atomic macOS Stealer (AMOS) on the Telegram channel to target macOS platforms, which is capable of extracting autofill information, passwords, wallets, and more.

According to Cyble Research and Intelligence Labs (CRIL), the Atomic macOS Stealer malware is specifically designed to target macOS and can steal sensitive information from the victim's machine.

The researchers have recently discovered a Telegram channel advertising this new information-stealing malware.

Moreover, the report said that the hacker behind this stealer is constantly improving this malware and adding new capabilities to make it more effective.

The malware's most recent update was seen in a Telegram post on April 25, highlighting its latest features.

According to the report, the Atomic macOS Stealer can steal various types of information from the victim's machine, including keychain passwords, complete system information, files from the desktop and documents folder, and even the macOS password.

In addition, the malware is designed to target multiple browsers and can extract auto-fills, passwords, cookies, wallets, and credit card information. Specifically, AMOS can target cryptowallets such as Electrum, Binance, Exodus, Atomic, and Coinomi.

The threat actor also offers additional services such as a web panel for managing victims, meta mask brute-forcing to steal seed and private keys, a crypto checker, and a dmg installer, after which the logs are shared via Telegram.

These services are available for $1,000 per month.

However, the report mentioned that macOS users can protect their systems from AMOS malware by installing a .dmg file on their machines.

After installing, users will need to authenticate the installation with a user password with a fake system dialog box following installation.

Once installed, it will scan for sensitive information, which it will steal with the system password if necessary, and send to a remote server.

--IANS

shs/uk/

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :TechnologyMalwareHacking

First Published: May 01 2023 | 2:12 PM IST

Next Story