MacOS password-stealing malware is spreading rapidly

Home/Internet Security, MacOS, Malware, Mobile Security, Security Advisory, Security Update, Tips/MacOS password-stealing malware is spreading rapidly

MacOS password-stealing malware is spreading rapidly

MacOS users are seeing a sharp rise in password-stealing malware, spread through fake apps and ads. Leading threats include “Atomic Stealer,” “Poseidon Stealer,” and “Cthulhu Stealer,” each using unique tactics, according to Palo Alto Networks’ Unit42.

MacOS password-stealing malware

Atomic Stealer (AMOS) was first found in April 2023 and is sold as malware-as-a-service (MaaS) on hacker forums and Telegram. It has evolved from Go to C++, with some versions using Python scripts or Mach-O binaries. Spread through malvertising, it steals browser passwords, cryptocurrency wallets, and instant messaging data.

Execution Flow: Atomic Stealer pretends to be a legitimate installer and tries to access files like /Users/$USER/Library/Application Support/Google/Chrome/Default/Login Data to steal Chrome login credentials.

Execution flow of atomic stealer : Source – Palo Alto Networks

Poseidon Stealer: Created by “Rodrigo4,” supposedly a former Atomic Stealer developer, Poseidon Stealer spreads through fake installers, Google ads, and malicious emails. It uses an encoded AppleScript to run its main logic and tricks users into entering their passwords during installation.

Poseidon Stealer : Source – Palo Alto Networks

How It Works:
Once installed, Poseidon Stealer prompts users for their password and steals browser passwords, cryptocurrency wallets, macOS Notes, and Telegram data, sending them to attacker-controlled servers.

Cthulhu Stealer: Sold on Telegram by the “Cthulhu Team,” this malware is written in Go and spread through fake app installers. It steals browser credentials, cryptocurrency wallets, and files like .png, .jpg, and .pdf.

Cthulhu Stealer : Source – Palo Alto Networks

How It Works:
Cthulhu Stealer tricks users with fake password prompts, including MetaMask requests. It saves stolen data in /Users/Shared/NW and uploads it to a command-and-control server.

Recommendation:

To protect against these threats, organizations should deploy advanced detection tools like Cortex XDR, which can analyze credential theft and sensitive data exfiltration. These tools help monitor suspicious AppleScript executions and unauthorized file access.

Additionally, adopting multi-layered defense strategies and staying updated on emerging threats are essential for protecting sensitive information.

Indicators of Compromise (IoC):

  • SHA256 Hashes for Atomic Stealer:
  • 599e6358503a0569d998f09ccfbdeaa629d8910f410e26df0ffbd68112e77b05
  • a33705df80d2a7c2deeb192c3de9e7f06c7bfd14b84f782cf86099c52a8b0178
  • IP Addresses for Atomic Stealer C2 Servers:
  • 94.142.138[.]177
  • 194.169.175[.]117
  • SHA256 Hashes for Poseidon Stealer:
  • 9f4f286e5e40b252512540cc186727abfb0ad15a76f91855b1e72efb006b854c
  • 5880430d86d092ac56bfa4aec7e245e3d9084e996165d64549ccb66b626d8c56
  • IP Addresses for Poseidon Stealer C2 Servers:
  • 194.59.183[.]241
  • 70.34.213[.]27

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2025-02-06T10:53:28+05:30 February 6th, 2025|Internet Security, MacOS, Malware, Mobile Security, Security Advisory, Security Update, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!