Atomic Stealer Mac Malware Distributed on Telegram

Recently, cybersecurity experts uncovered a new information-stealing malware called Atomic macOS Stealer (AMOS), which is being sold by a threat actor on the messaging app Telegram.

AMOS is specifically designed to target macOS platforms and has the ability to steal sensitive information, such as keychain passwords, system information, and even the macOS password. The threat actor has been updating the malware with new capabilities, as seen in a recent update on April 25th.

What's concerning is that the stealer can target multiple browsers and extract auto-fills, passwords, cookies, wallets, and credit card information, including specific cryptowallets like Electrum, Binance, Exodus, Atomic, and Coinomi. Despite being perceived as more secure than other operating systems, macOS platforms have become a popular target for threat actors, who have used various malware families such as MacStealer, RustBucket, and DazzleSpy.

The TA behind Atomic macOS Stealer is charging $1000 per month for additional services, including a web panel for managing victims, meta mask brute-forcing for stealing seed and private keys, crypto checker, and dmg installer.

What Are Advanced Persistent Threat Actors?

Advanced Persistent Threat (APT) actors are a type of cyber attacker who target a specific organization or individual with sophisticated and persistent attacks aimed at stealing valuable data or disrupting operations. APTs are typically state-sponsored, well-funded, and have access to advanced tools and techniques that allow them to bypass traditional security measures and evade detection.

APTs often use social engineering, spear-phishing, or other tactics to gain initial access to a network, after which they conduct reconnaissance to identify vulnerabilities and valuable data. They then use various methods to exfiltrate data, such as backdoors, remote access tools, and command and control servers.

Unlike other types of cyber attacks, APTs are not opportunistic, but rather, they are carefully planned and executed over a long period of time. They are also persistent, often returning to a target's network even after being detected and blocked.

APTs are a significant threat to organizations, particularly those in critical infrastructure, government, and military sectors. Detecting and mitigating APT attacks requires a combination of advanced security tools, employee training, and ongoing monitoring and response.

April 27, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.