A new malware, Atomic macOS Stealer, steals passwords and cryptocurrency from infected computers

A new malware, Atomic macOS Stealer, steals passwords and cryptocurrency from infected computers

In recent years, macOS has become increasingly popular among users, mainly due to its user interface, which is often praised for its simplicity and ease of use. It is also often considered more secure than other operating systems.

However, after the news of Fr MacStealer and developing a version of the notorious LockBit ransomware for Mac computers, another unpleasant surprise is coming for Apple fans.

Company researchers Cyble are warning that cybercriminals have developed new malware that can steal highly sensitive data from infected Macs.

The malware, dubbed Atomic macOS Stealer, can steal a wide range of information from compromised Mac computers: Apple Keychain passwords, system information, files from the Desktop and Documents folders, and even the computer’s password.

It can also steal web browser autofills, passwords, cookies and payment card information from the following web browsers: Chrome, Firefox, Brave, Edge, Vivaldi, Yandex, Opera and OperaGX.

In addition, Cyble’s team says Atomic Stealer can “target crypto-wallets such as Electrum, Binance, Exodus, Atomic, and Coinomi,” and thus lead to significant financial losses.

The group behind Atomic Stealer advertises numerous malware capabilities on the Telegram channel, and for $1,000 a month, cybercriminals sell access to a suite of features, including a web panel to control infected devices and a tool to access the popular MetaMask cryptocurrency wallet.

Users are advised to avoid pirated software and cracks. Downloading from a trusted software developer’s website or using the official Mac App Store is a much safer choice, researchers say.

Atomic Stealer is one of the latest examples of malware developed using Golang (Go), which has proven increasingly popular among cybercriminals with financial motives, and especially among those who want to use the same code to develop threats for Windows, macOS, and Linux.

Photo: Little John / Unsplash

Source: Informacija.rs by www.informacija.rs.

*The article has been translated based on the content of Informacija.rs by www.informacija.rs. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!