Atomic malware steals Mac passwords, crypto wallets, and extra • Graham Cluley

Atomic malware steals Mac passwords, crypto wallets, and more

Scorching on the heels of MacStealer and the event of a model of the infamous Lockbit ransomware for Macs comes one other malware menace for Apple followers.

Safety researchers at Cyble are warning that cybercriminals have developed a brand new malware menace which might steal extremely delicate information from the Mac computer systems it infects.

The malware, named Atomic Stealer by researchers, can a steal all kinds of data from compromised Macs:

  • keychain passwords
  • system info
  • recordsdata from the Desktop and Paperwork folders
  • the pc’s password
  • internet browser auto-fills, passwords, cookies, and cost card info

As well as, Cyble’s group says that Atomic Stealer can “goal cryptowallets equivalent to Electrum, Binance, Exodus, Atomic, and Coinomi.”

Clearly, any info which might result in a investor’s cryptocurrency pockets being compromised might result in important monetary losses.

EmailSignal as much as our publication
Safety information, recommendation, and ideas.

The group behind Atomic Stealer has been promoting the capabilities of the malware on a Telegram channel, and likewise promoting for $1000-per-month entry to a a set of web-based options together with a command-and-control dashboard of contaminated units, and instruments to brute power entry to the favored MetaMask cryptocurrency pockets.

Telegram ad
Hackers promote the capabilities of Atomic Stealer on Telegram.

Mac customers are suggested to at all times take care about the place they select to supply their software program – avoiding pirated software program and cracks. Downloading from a trusted software program developer’s web site or utilizing the official Mac App Retailer is mostly a a lot safer alternative.

Atomic Stealer is among the newest examples of malware being written utilizing Golang (Go), which has confirmed increasingly popular amongst financially-motivated cybercriminals, and specifically those that want to simply use the identical code to construct threats for Home windows, macOS, and Linux.

For extra info try the technical blog post by Cyble.

Discovered this text fascinating? Follow Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we put up.


Graham Cluley is a veteran of the anti-virus trade having labored for quite a few safety corporations because the early Nineteen Nineties when he wrote the primary ever model of Dr Solomon’s Anti-Virus Toolkit for Home windows. Now an impartial safety analyst, he usually makes media appearances and is a global public speaker on the subject of laptop safety, hackers, and on-line privateness.
Comply with him on Twitter at @gcluley, on Mastodon at @[email protected], or drop him an e-mail.