{"id":23428,"date":"2023-11-21T10:10:04","date_gmt":"2023-11-21T18:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/11\/21\/news-17158\/"},"modified":"2023-11-21T10:10:04","modified_gmt":"2023-11-21T18:10:04","slug":"news-17158","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/21\/news-17158\/","title":{"rendered":"Atomic Stealer distributed to Mac users via fake browser updates"},"content":{"rendered":"\n<p>Atomic Stealer, also known as AMOS, is a popular stealer for Mac OS. Back in September, we <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/atomic-macos-stealer-delivered-via-malvertising\">described<\/a> how malicious ads were tricking victims into downloading this piece of malware under the disguise of a popular application.<\/p>\n<p>In an interesting new development, AMOS is now being delivered to Mac users via a fake browser update chain tracked as &#8216;ClearFake&#8217;. This may very well be the first time we see one of the main social engineering campaigns, previously reserved for Windows, branch out not only in terms of geolocation but also operating system.<\/p>\n<p>With a growing list of compromised sites at their disposal, the threat actors are able to reach out a wider audience, stealing credentials and files of interest that can be monetized immediately or repurposed for additional attacks. <\/p>\n<h3 class=\"wp-block-heading\" id=\"h-discovery\">Discovery<\/h3>\n<p>ClearFake is a newer malware campaign that leverages compromised websites to distribute fake browser updates. It was originally <a href=\"https:\/\/rmceoin.github.io\/malware-analysis\/clearfake\/\">discovered<\/a> by Randy McEoin in August and has since gone through a number of upgrades, including the use of <a href=\"https:\/\/krebsonsecurity.com\/2023\/10\/the-fake-browser-update-scam-gets-a-makeover\/\">smart contracts<\/a> to build its redirect mechanism, making it one of the most prevalent and dangerous social engineering schemes.<\/p>\n<p>On November 17, security researcher <a href=\"https:\/\/infosec.exchange\/@ankit_anubhav\/111425827558836814\">Ankit Anubhav<\/a> observed that ClearFake was distributed to Mac users as well with a corresponding payload:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"577\" height=\"472\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/post.png\" alt=\"\" class=\"wp-image-98206\" \/><\/figure>\n<p>The Safari template mimics the official Apple website and is available in different languages:<\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1843\" height=\"1379\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/safari.png?w=1024\" alt=\"\" class=\"wp-image-98207\" style=\"aspect-ratio:1.3368146214099217;width:1184px;height:auto\" \/><\/figure>\n<p>Since Google Chrome is also popular on Macs, there is a template for it which closely resembles the one used for Windows users:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"693\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/chrome.png\" alt=\"\" class=\"wp-image-98210\" \/><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-atomic-stealer\">Atomic Stealer<\/h3>\n<p>The payload is made for for Mac users, a DMG file purporting to be a Safari or Chrome update. Victims are instructed on how to open the file which immediately runs commands after prompting for the administrative password.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"794\" height=\"613\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/update.png\" alt=\"\" class=\"wp-image-98214\" \/><\/figure>\n<p>Looking at the strings from the malicious application, we can see those commands which include password and file grabbing capabilities:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"617\" height=\"211\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/file_.png\" alt=\"\" class=\"wp-image-98230\" \/><\/figure>\n<pre class=\"wp-block-preformatted\">find-generic-password -ga 'Chrome' | awk '{print $2}' SecKeychainSearchCopyNext: \/Chromium\/Chrome \/Chromium\/Chrome\/Local State FileGrabber tell application \"Finder\" set desktopFolder to path to desktop folder set documentsFolder to path to documents folder set srcFiles to every file of desktopFolder whose name extension is in {\"txt\", \"rtf\", \"doc\", \"docx\", \"xls\", \"key\", \"wallet\", \"jpg\", \"png\", \"web3\", \"dat\"} set docsFiles to every file of documentsFolder whose name extension is in {\"txt\", \"rtf\", \"doc\", \"docx\", \"xls\", \"key\", \"wallet\", \"jpg\", \"png\", \"web3\", \"dat\"}<\/pre>\n<p>In the same file, we can find the malware&#8217;s command and control server where the stolen data is sent to:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"849\" height=\"535\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/C2.png\" alt=\"\" class=\"wp-image-98228\" \/><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-macs-need-protection-too\">Macs need protection too<\/h3>\n<p>Fake browser updates have been a common theme for Windows users for years, and yet up until now the threat actors didn&#8217;t expand onto MacOS in a consistent way. The popularity of stealers such as AMOS makes it quite easy to adapt the payload to different victims, with minor adjustments.<\/p>\n<p>Because ClearFake has become one of the main social engineering campaigns recently, Mac users should pay particular attention to it. We recommend leveraging web protection tools to block the malicious infrastructure associated with this threat actor.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"898\" height=\"596\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/BG_-1.png\" alt=\"\" class=\"wp-image-98413\" \/><\/figure>\n<p>Malwarebytes users are protected against Atomic Stealer:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"882\" height=\"653\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/MBAM.png\" alt=\"\" class=\"wp-image-98216\" \/><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h3>\n<p>Malicious domains<\/p>\n<pre class=\"wp-block-preformatted\">longlakeweb[.]com chalomannoakhali[.]com jaminzaidad[.]com royaltrustrbc[.]com<\/pre>\n<p>AMOS stealer<\/p>\n<pre class=\"wp-block-preformatted\">4cb531bd83a1ebf4061c98f799cdc2922059aff1a49939d427054a556e89f464<br>be634e786d5d01b91f46efd63e8d71f79b423bfb2d23459e5060a9532b4dcc7b<\/pre>\n<p>AMOS C2<\/p>\n<pre class=\"wp-block-preformatted\">194.169.175[.]117<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/11\/atomic-stealer-distributed-to-mac-users-via-fake-browser-updates\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Compromised websites are being used to redirect to fake browser updates and deliver malware onto Mac users. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-23428","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23428"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23428\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23428"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}