{"id":25194,"date":"2024-09-12T11:21:43","date_gmt":"2024-09-12T19:21:43","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/09\/12\/news-18924\/"},"modified":"2024-09-12T11:21:43","modified_gmt":"2024-09-12T19:21:43","slug":"news-18924","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/09\/12\/news-18924\/","title":{"rendered":"Atomic macOS Stealer leads sensitive data theft on macOS"},"content":{"rendered":"<p><strong>Credit to Author: Jagadeesh Chandraiah| Date: Fri, 06 Sep 2024 11:04:28 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>There was historically a tendency to believe that macOS was less susceptible to malware than Windows, possibly because the operating system has <a href=\"https:\/\/learn.g2.com\/operating-system-statistics\" target=\"_blank\" rel=\"noopener\">less market share<\/a> than Windows, and <a href=\"https:\/\/simplemdm.com\/blog\/how-secure-are-macs\/\" target=\"_blank\" rel=\"noopener\">a native suite of security features<\/a> that require malware developers to adopt different approaches. The belief was that, if it was susceptible at all, it was to odd, unconventional attacks and malware. But, over time, that\u2019s changed. Mainstream malware is now beginning to hit macOS regularly (albeit not to the same extent as Windows), and <a href=\"https:\/\/news.sophos.com\/en-us\/tag\/information-stealers\/\" target=\"_blank\" rel=\"noopener\">infostealers<\/a> are a prime example of this. In our telemetry, stealers account for over 50% of all macOS detections in the last six months, and Atomic macOS Stealer (AMOS) is one of the most common families we see.<\/p>\n<p>AMOS, f<a href=\"https:\/\/cyble.com\/blog\/threat-actor-selling-new-atomic-macos-amos-stealer-on-telegram\/\" target=\"_blank\" rel=\"noopener\">irst reported by Cyble in April 2023<\/a>, is designed to steal sensitive data \u2013 including cookies, passwords, autofill data, and the contents of cryptocurrency wallets \u2013 from infected machines, and send them back to a threat actor. At that point, a threat actor may use the stolen information themselves \u2013 or, more likely, sell it to other threat actors on criminal marketplaces.<\/p>\n<p>The market for this stolen data \u2013 known as \u2018logs\u2019 in the cybercrime underground \u2013 is <a href=\"https:\/\/blog.sekoia.io\/overview-of-the-russian-speaking-infostealer-ecosystem-the-logs\/\" target=\"_blank\" rel=\"noopener\">large and very active<\/a>, and the price of AMOS has tripled in the past year \u2013 which speaks both to the desire to target macOS users and the value of doing so to criminals.<\/p>\n<p>While AMOS is not the only player in town \u2013 rivals include <a href=\"https:\/\/www.sentinelone.com\/blog\/macos-metastealer-new-family-of-obfuscated-go-infostealers-spread-in-targeted-attacks\" target=\"_blank\" rel=\"noopener\">MetaStealer<\/a>, K<a href=\"https:\/\/www.darkreading.com\/endpoint-security\/sophisticated-macos-infostealers-apple-built-in-detection\">eySteal, and CherryPie<\/a> \u2013 it is one of the most prominent, so we\u2019ve put together a brief guide on what AMOS is and how it works, to help defenders get a handle on this increasingly prevalent malware.<\/p>\n<h1>Distribution<\/h1>\n<p>AMOS is advertised and sold on <a href=\"https:\/\/www.sentinelone.com\/blog\/atomic-stealer-threat-actor-spawns-second-variant-of-macos-malware-sold-on-telegram\/\" target=\"_blank\" rel=\"noopener\">public Telegram channels<\/a>. Back in May 2023, it was available for $1000 a month (a \u2018lifetime\u2019 licence, price undisclosed, was also available), but we can report that as of May 2024, the cost appears to have increased to $3000 a month. As shown in the screenshot below, the AMOS advert includes a sizeable list of targeted browsers (with the ability to steal cookies, passwords, and autofill information); cryptocurrency wallets, and sensitive system information (including the Apple keychain and the macOS password).. As shown in the screenshot below, the AMOS advert includes a sizeable list of targeted browsers (with the ability to steal cookies, passwords, and autofill information); cryptocurrency wallets, and sensitive system information (including the Apple keychain and the macOS password).<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957195\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image1.png\" alt=\"A screenshot of a Telegram channel listing various features of AMOS, some in Russian and some in English\" width=\"640\" height=\"624\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image1.png 1101w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image1.png?resize=300,292 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image1.png?resize=768,748 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image1.png?resize=1024,998 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: An advert for AMOS on a Telegram channel. Note the price of $3000 at the bottom of the screenshot<\/em><\/p>\n<h1>Initial infection vectors<\/h1>\n<p>From what we\u2019ve observed in our telemetry, and from what <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\" target=\"_blank\" rel=\"noopener\">other researchers have discovered<\/a>, many threat actors are infecting targets with AMOS via <a href=\"https:\/\/news.sophos.com\/en-us\/tag\/malvertising\/\" target=\"_blank\" rel=\"noopener\">malvertising<\/a> (a technique whereby threat actors abuse valid online advertisement frameworks to direct users towards malicious sites containing malware) or \u2018SEO poisoning\u2019 (leveraging search engine ranking algorithms to get malicious sites to the top of search engine results). When unsuspecting users search for the name of a particular software or utility, the threat actor\u2019s site appears prominently in the results \u2013 and will offer a download, which typically imitates the legitimate application but secretly installs malware on the user\u2019s machine.<\/p>\n<p>Some of the legitimate applications we\u2019ve seen AMOS imitate in this manner include: <a href=\"https:\/\/www.notion.so\/\" target=\"_blank\" rel=\"noopener\">Notion<\/a>, a productivity app; <a href=\"https:\/\/trello.com\/\" target=\"_blank\" rel=\"noopener\">Trello<\/a>, a project management tool; <a href=\"https:\/\/arc.net\/\" target=\"_blank\" rel=\"noopener\">the Arc browser<\/a>; <a href=\"https:\/\/slack.com\/intl\/en-gb\" target=\"_blank\" rel=\"noopener\">Slack<\/a>; and <a href=\"https:\/\/todoist.com\/\" target=\"_blank\" rel=\"noopener\">Todoist<\/a>, a to-do-list application.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957196\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image2.png\" alt=\"A screenshot of a malicious domain imitating the legitimate Slack website\" width=\"640\" height=\"433\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image2.png 1377w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image2.png?resize=300,203 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image2.png?resize=768,519 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image2.png?resize=1024,692 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 2: A malicious domain imitating the legitimate Slack domain, in order to trick users into downloading an infostealer<\/em><\/p>\n<p>However, AMOS\u2019s malvertising also extends to social media. For instance, we observed a malvertising campaign on X.com, leading to a fake installer for \u2018Clean My Mac X\u2019 (a legitimate macOS application) hosted on a lookalike domain of macpaw[.]us, which deceptively mimics <a href=\"https:\/\/macpaw.com\/\" target=\"_blank\" rel=\"noopener\">the real website<\/a> for this product.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957197\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image3.png\" alt=\"A screenshot of a post on X, which points users to a malicious domain imitating a genuine domain. There is a preview of the site in the post, showing a man pointing to a computer\" width=\"640\" height=\"616\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image3.png 977w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image3.png?resize=300,289 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image3.png?resize=768,739 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 3: A malvertising campaign on X.com<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957198\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image4.png\" alt=\"A screenshot of a domain hosting malware. The site resembles the official iTunes store.\" width=\"640\" height=\"480\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image4.png 921w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image4.png?resize=300,225 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image4.png?resize=768,576 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 4: A domain hosting <a href=\"https:\/\/www.virustotal.com\/gui\/file\/96f80fef3323e5bc0ce067cd7a93b9739174e29f786b09357125550a033b0288\/relations\" target=\"_blank\" rel=\"noopener\">AMOS<\/a> (obtained from <a href=\"https:\/\/urlscan.io\/result\/027802ea-5e90-4040-a862-f96c495c9696\/\" target=\"_blank\" rel=\"noopener\">urlscan<\/a>). Note that the malvertisers have created a page that closely resembles the iTunes Store. Sophos and other vendors have classified this domain as malicious<\/em><\/p>\n<p>After investigating a customer incident involving AMOS, we also noted that threat actors have hosted AMOS binaries on GitHub, possibly as part of a malvertising-like campaign.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957199\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image5.png\" alt=\"A screenshot of a GitHub project owner page\" width=\"640\" height=\"269\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image5.png 1304w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image5.png?resize=300,126 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image5.png?resize=768,323 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image5.png?resize=1024,431 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 5: AMOS hosted on a GitHub repository (now taken down)<\/em><\/p>\n<p>We also discovered several open directories that hosted AMOS malware. Some of these domains were also distributing Windows malware (the <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/one-year-later-rhadamanthys-is-still-dropped-via-malvertising\" target=\"_blank\" rel=\"noopener\">Rhadamanthys infostealer<\/a>).<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957200\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image6.png\" alt=\"A screenshot of a directory listing on a website, showing various .dmg files hosted on the domain.\" width=\"640\" height=\"397\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image6.png 1197w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image6.png?resize=300,186 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image6.png?resize=768,477 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image6.png?resize=1024,636 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 6: A domain hosting various malicious samples disguised as legitimate applications<\/em><\/p>\n<h1>Command and control<\/h1>\n<p>AMOS C2 panels are protected with credentials. As shown in the screenshots below, the panels provide a simple visualization of campaigns and stolen data for the benefit of the threat actors.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957201\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image7.png\" alt=\"A screenshot of a domain showing a login page for the AMOS backend panel\" width=\"640\" height=\"480\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image7.png 986w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image7.png?resize=300,225 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image7.png?resize=768,576 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 7: Active AMOS C2 login panel (obtained from <a href=\"https:\/\/urlscan.io\/result\/d6a13720-8630-4dd7-b257-0569c9ba2abd\/#summary\" target=\"_blank\" rel=\"noopener\">urlscan<\/a>)<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957202\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image8.png\" alt=\"An AMOS panel template\" width=\"640\" height=\"480\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image8.png 1032w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image8.png?resize=300,225 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image8.png?resize=768,576 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image8.png?resize=1024,768 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 8: AMOS panel template for accessing stolen data (obtained from <a href=\"https:\/\/urlscan.io\/result\/30067698-3dd0-456e-beb5-74304edfd3c4\/#summary\" target=\"_blank\" rel=\"noopener\">urlscan<\/a>)<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957203\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image9.png\" alt=\"A screenshot showing examples of AMOS logs\" width=\"640\" height=\"394\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image9.png 1379w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image9.png?resize=300,185 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image9.png?resize=768,473 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image9.png?resize=1024,630 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 9: AMOS logs displaying different data (this image was taken from AMOS marketing material; the threat actor has redacted some information themselves)<\/em><\/p>\n<h1>Evolving capabilities<\/h1>\n<p>As we mentioned earlier, AMOS was first reported on in April 2023. Since then, the malware has evolved to evade detection and complicate analysis. For instance, the malware\u2019s function names and strings are now obfuscated.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957204\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image10.png\" alt=\"Side-by-side screenshots of AMOS code in a disassembler\" width=\"640\" height=\"320\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image10.png 1312w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image10.png?resize=300,150 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image10.png?resize=768,383 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image10.png?resize=1024,511 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 10: Screenshots of AMOS\u2019s code, showing a previous version (left) and an obfuscated version (right). Note that the function names are readable in the left-hand version, but have been obfuscated in the newer version on the right<\/em><\/p>\n<p>We\u2019ve also observed recent AMOS variants using a Python dropper (<a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/when-stealers-converge-new-variant-of-atomic-stealer-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">other researchers have also reported on this<\/a>), and the malware developers have shifted some key data \u2013 including strings and functions \u2013 to this dropper, rather than the main Mach-O binary, likely to avoid detection.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957205\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image11.png\" alt=\"A screenshot of AMOS-related code from a Python dropper\" width=\"640\" height=\"319\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image11.png 1100w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image11.png?resize=300,149 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image11.png?resize=768,383 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image11.png?resize=1024,510 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 11: Strings and functions in the Python dropper<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957206\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png\" alt=\"Screenshot of AMOS-related code, from a Python dropper\" width=\"640\" height=\"312\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png 1700w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png?resize=300,146 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png?resize=768,375 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png?resize=1024,500 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image12.png?resize=1536,750 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 12: An excerpt from a Python sample, which invokes AppleScript for the <a href=\"https:\/\/spycloud.com\/blog\/reverse-engineering-atomic-macos-stealer\/\" target=\"_blank\" rel=\"noopener\">\u201cfilegrabber()\u201d function<\/a>. This function was included in the binary in earlier variants, but here the threat actor has reimplemented the entire function in Python<\/em><\/p>\n<h1>Possible future developments<\/h1>\n<p>AMOS distributors recently put out an advertisement in which they claimed a new version of the malware would target iPhone users. However, we have not seen any samples in the wild to date, and cannot confirm that an iOS version of AMOS is available for sale at the time of writing.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957207\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image13.png\" alt=\"A screenshot of a post on a Telegram channel, in Russian\" width=\"640\" height=\"383\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image13.png 699w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image13.png?resize=300,179 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 13: A post on the AMOS Telegram channel regarding iOS targeting. The Russian text reads (trans.): \u201cWell, the iPhone is opened. We are expecting a new product for iOS to reach the masses. Tests showed success. The price will be appropriate.\u201d<\/em><\/p>\n<p>A possible driving force behind this announcement is the EU\u2019s Digital Markets Act (DMA), under which Apple is obliged to make <a href=\"https:\/\/support.apple.com\/en-gb\/118110\" target=\"_blank\" rel=\"noopener\">alternative app marketplaces available to EU-based iPhone users<\/a> from iOS 17.4 onwards. Developers will also be allowed to distribute apps directly from their <a href=\"https:\/\/9to5mac.com\/2024\/03\/12\/iphone-app-store-changes-web-distribution-more\/\" target=\"_blank\" rel=\"noopener\">website<\/a> \u2013 which potentially means that threat actors looking to distribute an iOS version of AMOS could adopt the same malvertising techniques they\u2019re currently using to target macOS users.<\/p>\n<h1>Protection and prevention<\/h1>\n<p>As we\u2019ve seen from our telemetry over the past year, threat actors are increasingly focusing on macOS, particularly in the form of infostealers, and the rise of AMOS prices suggests that they could be having some success. With that in mind, as with any device, users should only install software from legitimate sources with good reputations, and be extremely wary of any pop-ups requesting either passwords or elevated privileges.<\/p>\n<p>All the stealers we have seen to date are distributed outside the official Mac store and are not cryptographically verified by Apple \u2013 hence the use of social engineering we discussed previously. They also request information like password and unwanted data access, which should ring alarm bells for users, particularly when it\u2019s a third-party application asking for those permissions (although note that in macOS 15 (Sequoia), due to be released in fall 2024, it will be more difficult to override Gatekeeper <a href=\"https:\/\/developer.apple.com\/news\/?id=saqachfa\" target=\"_blank\" rel=\"noopener\">\u201cwhen opening software that isn\u2019t signed correctly or notarized.\u201d<\/a> Instead of being able to Control-click, users will have to make a change in the system settings for each app they want to open.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957208\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image14.png\" alt=\"A screenshot of macOS malware, resulting in a pop-up dialogue asking for the system password\" width=\"640\" height=\"274\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image14.png 878w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image14.png?resize=300,128 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/image14.png?resize=768,329 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 14: An example of macOS malware asking for a password, which should be a big red flag for users. Note also the request to right-click and open<\/em><\/p>\n<p>By default, browsers tend to store both encrypted autofill data and the encryption key in a fixed location, so infostealers running on infected systems can exfiltrate both from disk. Having encryption based on a master password or biometrics would help to protect from this type of attack.<\/p>\n<p>If you have encountered any macOS software which you think is suspicious, please <a href=\"https:\/\/support.sophos.com\/support\/s\/filesubmission?language=en_US\" target=\"_blank\" rel=\"noopener\">report it to Sophos<\/a>.<\/p>\n<p>Sophos protects against these stealers with protection names beginning with OSX\/InfoStl-* and OSX\/PWS-*. IOCs relating to these stealers are <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/Atomic-infostealer-IOCs.csv\">available on our GitHub repository<\/a>.<\/p>\n<h1>Acknowledgments<\/h1>\n<p>Sophos X-Ops would like to thank Colin Cowie of Sophos\u2019 Managed Detection and Response (MDR) team for his contribution to this article.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/09\/06\/atomic-macos-stealer-leads-sensitive-data-theft-on-macos\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/shutterstock_2449650047.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jagadeesh Chandraiah| Date: Fri, 06 Sep 2024 11:04:28 +0000<\/strong><\/p>\n<p>Sophos X-Ops explores the distribution and capabilities of the Atomic macOS Stealer (AMOS)<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[30076,30077,19881,10403,27030,16771],"class_list":["post-25194","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-amos","tag-atomic-stealer","tag-infostealer","tag-macos","tag-sophos-x-ops","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25194"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25194\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}