Thursday, September 11, 2025
HomeCyber SecurityAtomic macOS Stealer leads delicate knowledge theft on macOS – Sophos Information

Atomic macOS Stealer leads delicate knowledge theft on macOS – Sophos Information


There was traditionally a bent to imagine that macOS was much less vulnerable to malware than Home windows, probably as a result of the working system has much less market share than Home windows, and a local suite of safety features that require malware builders to undertake totally different approaches. The idea was that, if it was vulnerable in any respect, it was to odd, unconventional assaults and malware. However, over time, that’s modified. Mainstream malware is now starting to hit macOS usually (albeit to not the identical extent as Home windows), and infostealers are a chief instance of this. In our telemetry, stealers account for over 50% of all macOS detections within the final six months, and Atomic macOS Stealer (AMOS) is without doubt one of the most typical households we see.

AMOS, first reported by Cyble in April 2023, is designed to steal delicate knowledge – together with cookies, passwords, autofill knowledge, and the contents of cryptocurrency wallets – from contaminated machines, and ship them again to a menace actor. At that time, a menace actor might use the stolen info themselves – or, extra possible, promote it to different menace actors on prison marketplaces.

The marketplace for this stolen knowledge – referred to as ‘logs’ within the cybercrime underground – is massive and really lively, and the worth of AMOS has tripled previously yr – which speaks each to the need to focus on macOS customers and the worth of doing so to criminals.

Whereas AMOS isn’t the one participant on the town – rivals embody MetaStealer, OkeySteal, and CherryPie – it is without doubt one of the most outstanding, so we’ve put collectively a quick information on what AMOS is and the way it works, to assist defenders get a deal with on this more and more prevalent malware.

AMOS is marketed and offered on public Telegram channels. Again in Could 2023, it was out there for $1000 a month (a ‘lifetime’ licence, value undisclosed, was additionally out there), however we will report that as of Could 2024, the fee seems to have elevated to $3000 a month. As proven within the screenshot beneath, the AMOS advert features a sizeable checklist of focused browsers (with the power to steal cookies, passwords, and autofill info); cryptocurrency wallets, and delicate system info (together with the Apple keychain and the macOS password).. As proven within the screenshot beneath, the AMOS advert features a sizeable checklist of focused browsers (with the power to steal cookies, passwords, and autofill info); cryptocurrency wallets, and delicate system info (together with the Apple keychain and the macOS password).

A screenshot of a Telegram channel listing various features of AMOS, some in Russian and some in English

Determine 1: An advert for AMOS on a Telegram channel. Be aware the worth of $3000 on the backside of the screenshot

From what we’ve noticed in our telemetry, and from what different researchers have found, many menace actors are infecting targets with AMOS through malvertising (a way whereby menace actors abuse legitimate on-line commercial frameworks to direct customers in the direction of malicious websites containing malware) or ‘web optimization poisoning’ (leveraging search engine rating algorithms to get malicious websites to the highest of search engine outcomes). When unsuspecting customers seek for the title of a specific software program or utility, the menace actor’s web site seems prominently within the outcomes – and can provide a obtain, which usually imitates the authentic software however secretly installs malware on the consumer’s machine.

A number of the authentic functions we’ve seen AMOS imitate on this method embody: Notion, a productiveness app; Trello, a undertaking administration device; the Arc browser; Slack; and Todoist, a to-do-list software.

A screenshot of a malicious domain imitating the legitimate Slack website

Determine 2: A malicious area imitating the authentic Slack area, in an effort to trick customers into downloading an infostealer

Nevertheless, AMOS’s malvertising additionally extends to social media. For example, we noticed a malvertising marketing campaign on X.com, resulting in a pretend installer for ‘Clear My Mac X’ (a authentic macOS software) hosted on a lookalike area of macpaw[.]us, which deceptively mimics the actual web site for this product.

A screenshot of a post on X, which points users to a malicious domain imitating a genuine domain. There is a preview of the site in the post, showing a man pointing to a computer

Determine 3: A malvertising marketing campaign on X.com

A screenshot of a domain hosting malware. The site resembles the official iTunes store.

Determine 4: A site internet hosting AMOS (obtained from urlscan). Be aware that the malvertisers have created a web page that intently resembles the iTunes Retailer. Sophos and different distributors have labeled this area as malicious

After investigating a buyer incident involving AMOS, we additionally famous that menace actors have hosted AMOS binaries on GitHub, probably as a part of a malvertising-like marketing campaign.

A screenshot of a GitHub project owner page

Determine 5: AMOS hosted on a GitHub repository (now taken down)

We additionally found a number of open directories that hosted AMOS malware. A few of these domains have been additionally distributing Home windows malware (the Rhadamanthys infostealer).

A screenshot of a directory listing on a website, showing various .dmg files hosted on the domain.

Determine 6: A site internet hosting numerous malicious samples disguised as authentic functions

AMOS C2 panels are protected with credentials. As proven within the screenshots beneath, the panels present a easy visualization of campaigns and stolen knowledge for the good thing about the menace actors.

A screenshot of a domain showing a login page for the AMOS backend panel

Determine 7: Energetic AMOS C2 login panel (obtained from urlscan)

An AMOS panel template

Determine 8: AMOS panel template for accessing stolen knowledge (obtained from urlscan)

A screenshot showing examples of AMOS logs

Determine 9: AMOS logs displaying totally different knowledge (this picture was taken from AMOS advertising materials; the menace actor has redacted some info themselves)

As we talked about earlier, AMOS was first reported on in April 2023. Since then, the malware has developed to evade detection and complicate evaluation. For example, the malware’s perform names and strings are actually obfuscated.

Side-by-side screenshots of AMOS code in a disassembler

Determine 10: Screenshots of AMOS’s code, displaying a earlier model (left) and an obfuscated model (proper). Be aware that the perform names are readable within the left-hand model, however have been obfuscated within the newer model on the best

We’ve additionally noticed current AMOS variants utilizing a Python dropper (different researchers have additionally reported on this), and the malware builders have shifted some key knowledge – together with strings and capabilities – to this dropper, moderately than the primary Mach-O binary, more likely to keep away from detection.

A screenshot of AMOS-related code from a Python dropper

Determine 11: Strings and capabilities within the Python dropper

Screenshot of AMOS-related code, from a Python dropper

Determine 12: An excerpt from a Python pattern, which invokes AppleScript for the “filegrabber()” perform. This perform was included within the binary in earlier variants, however right here the menace actor has reimplemented all the perform in Python

AMOS distributors lately put out an commercial through which they claimed a brand new model of the malware would goal iPhone customers. Nevertheless, now we have not seen any samples within the wild thus far, and can’t verify that an iOS model of AMOS is on the market on the market on the time of writing.

A screenshot of a post on a Telegram channel, in Russian

Determine 13: A submit on the AMOS Telegram channel concerning iOS focusing on. The Russian textual content reads (trans.): “Nicely, the iPhone is opened. We expect a brand new product for iOS to succeed in the plenty. Assessments confirmed success. The value might be applicable.”

A doable driving power behind this announcement is the EU’s Digital Markets Act (DMA), beneath which Apple is obliged to make different app marketplaces out there to EU-based iPhone customers from iOS 17.4 onwards. Builders may even be allowed to distribute apps instantly from their web site – which doubtlessly implies that menace actors seeking to distribute an iOS model of AMOS might undertake the identical malvertising methods they’re presently utilizing to focus on macOS customers.

As we’ve seen from our telemetry over the previous yr, menace actors are more and more specializing in macOS, notably within the type of infostealers, and the rise of AMOS costs means that they could possibly be having some success. With that in thoughts, as with every machine, customers ought to solely set up software program from authentic sources with good reputations, and be extraordinarily cautious of any pop-ups requesting both passwords or elevated privileges.

All of the stealers now we have seen thus far are distributed outdoors the official Mac retailer and usually are not cryptographically verified by Apple – therefore using social engineering we mentioned beforehand. In addition they request info like password and undesirable knowledge entry, which ought to ring alarm bells for customers, notably when it’s a third-party software asking for these permissions (though notice that in macOS 15 (Sequoia), resulting from be launched in fall 2024, will probably be tougher to override Gatekeeper “when opening software program that isn’t signed appropriately or notarized.” As a substitute of with the ability to Management-click, customers should make a change within the system settings for every app they need to open.

A screenshot of macOS malware, resulting in a pop-up dialogue asking for the system password

Determine 14: An instance of macOS malware asking for a password, which ought to be an enormous pink flag for customers. Be aware additionally the request to right-click and open

By default, browsers are likely to retailer each encrypted autofill knowledge and the encryption key in a set location, so infostealers operating on contaminated programs can exfiltrate each from disk. Having encryption based mostly on a grasp password or biometrics would assist to guard from any such assault.

If in case you have encountered any macOS software program which you assume is suspicious, please report it to Sophos.

Sophos protects towards these stealers with safety names starting with OSX/InfoStl-* and OSX/PWS-*. IOCs relating to those stealers are out there on our GitHub repository.

Sophos X-Ops wish to thank Colin Cowie of Sophos’ Managed Detection and Response (MDR) workforce for his contribution to this text.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments