Info Stealing
macOS
Golang
ATOMIC Stealer (also known as Atomic macOS Stealer - AMOS) is a malware for macOS. It steals sensitive information: keychain passwords, system info, files from desktop and documents folders, and even the macOS password. It also targets multiple browsers to steal autofill data, passwords, cookies, wallets, and credit card info. It can also compromise cryptocurrency wallets: Electrum, Binance, Exodus, Atomic and Coinomi. It’s being sold on Telegram forums and the developers are continuously updating it to evade detection and improve.
ATOMIC Stealer is a threat to macOS users, designed to infect Apple’s OS and extract personal and financial data. This is a growing trend of cybercriminals targeting macOS which was once thought to be less vulnerable to malware. The malware is being sold as a service with additional tools like web panel to manage victims, MetaMask brute-forcing to steal seed phrases and private keys and DMG installer for a subscription fee.
Distribution
ATOMIC Stealer is distributed through social engineering, fake browser update prompts and malicious ads. Users may encounter these prompts while browsing and download the malware thinking it’s a legitimate software update. Once installed ATOMIC Stealer will start working, accessing and sending sensitive information to a remote server controlled by the attackers.
Evasion
The malware uses advanced techniques to evade macOS built-in security features. It uses stolen code from Apple’s XProtect antivirus system to stay undetected for a long time. Such evasion techniques make it hard even for experienced IT professionals to detect its presence so the damage can be done before detection and removal.
Deploy macOS-specific endpoint security solutions to detect and prevent malware infections.
Educate users about phishing and malicious ads to reduce the chances of accidental malware installation.
Check for data exfiltration in network traffic.
Update macOS and apps.