ATOMIC Stealer

Info Stealing

macOS

Golang

ATOMIC Stealer

ATOMIC Stealer

ATOMIC Stealer (also known as Atomic macOS Stealer - AMOS) is a malware for macOS. It steals sensitive information: keychain passwords, system info, files from desktop and documents folders, and even the macOS password. It also targets multiple browsers to steal autofill data, passwords, cookies, wallets, and credit card info. It can also compromise cryptocurrency wallets: Electrum, Binance, Exodus, Atomic and Coinomi. It’s being sold on Telegram forums and the developers are continuously updating it to evade detection and improve.

Key Insights

Key Insights

ATOMIC Stealer is a threat to macOS users, designed to infect Apple’s OS and extract personal and financial data. This is a growing trend of cybercriminals targeting macOS which was once thought to be less vulnerable to malware. The malware is being sold as a service with additional tools like web panel to manage victims, MetaMask brute-forcing to steal seed phrases and private keys and DMG installer for a subscription fee.

Distribution

ATOMIC Stealer is distributed through social engineering, fake browser update prompts and malicious ads. Users may encounter these prompts while browsing and download the malware thinking it’s a legitimate software update. Once installed ATOMIC Stealer will start working, accessing and sending sensitive information to a remote server controlled by the attackers.

Evasion

The malware uses advanced techniques to evade macOS built-in security features. It uses stolen code from Apple’s XProtect antivirus system to stay undetected for a long time. Such evasion techniques make it hard even for experienced IT professionals to detect its presence so the damage can be done before detection and removal.

Known Variants

Known Variants

There are no known variants of ATOMIC Stealer but the malware is being updated to support new macOS versions and to improve evasion. These updates are part of the service offered to subscribers so the malware will be effective against the latest security patches from Apple.

There are no known variants of ATOMIC Stealer but the malware is being updated to support new macOS versions and to improve evasion. These updates are part of the service offered to subscribers so the malware will be effective against the latest security patches from Apple.

Mitigation Strategies

Mitigation Strategies


  • Deploy macOS-specific endpoint security solutions to detect and prevent malware infections.

  • Educate users about phishing and malicious ads to reduce the chances of accidental malware installation.

  • Check for data exfiltration in network traffic.

  • Update macOS and apps.

Targeted Industries or Sectors

Targeted Industries or Sectors

ATOMIC Stealer targets macOS users in technology, design and cryptocurrency sectors. Users in these sectors are more at risk as they handle valuable data and are a lucrative target for cybercriminals to make money through data theft and exploitation.

ATOMIC Stealer targets macOS users in technology, design and cryptocurrency sectors. Users in these sectors are more at risk as they handle valuable data and are a lucrative target for cybercriminals to make money through data theft and exploitation.

Associated Threat Actors

Associated Threat Actors

The malware is associated with small scale cybercriminal groups that target macOS environment. These actors are drawn to the growing market share of macOS and the financial gains from stealing sensitive information especially from cryptocurrency wallets. The anonymity provided by platforms like Telegram makes it easy to distribute and sell such malware.

The malware is associated with small scale cybercriminal groups that target macOS environment. These actors are drawn to the growing market share of macOS and the financial gains from stealing sensitive information especially from cryptocurrency wallets. The anonymity provided by platforms like Telegram makes it easy to distribute and sell such malware.

References