AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Malware emergency on macOS: Atomic Stealer's threat to sensitive data and cryptocurrencies

New infection and mitigation techniques to protect Mac devices

Atomic Stealer is a new malware that affects macOS, stealing sensitive data and cryptocurrencies. It spreads as cracked software. It uses AppleScript to obtain passwords and steals data from browsers and cryptocurrency wallets. It is recommended to download from official sources only.

This pill is also available in Italian language

The cybersecurity landscape is constantly evolving, with new threats emerging daily. Users of macOS systems have long been considered relatively safe compared to the digital dangers that often threaten other platforms. However, this perception of security is challenged by recent malware that is targeting their devices. This new malicious code, called Atomic Stealer, exposes users' sensitive data and cryptocurrencies to serious risks, underlining the importance of constantly staying informed and taking adequate cyber protection measures.

Atomic Stealer: how malware works

The discovery of Atomic Stealer has worried specialists in the sector. In-depth studies have revealed the working mechanisms of the malware and the techniques used to infect systems. Atomic Stealer disguises itself as crack files of popular software such as CleanMyMac and Photoshop, tricking users into downloading and installing it. Once executed, the malware is capable of stealing sensitive data from browsers and cryptocurrency wallets on the infected system. The ability to remain hidden and operate without arousing suspicion makes Atomic Stealer a particularly insidious threat.

Advanced data stealing methods

Once installed, Atomic Stealer uses AppleScript to trick users into providing their system passwords, thus allowing even deeper access to the device. The malware is programmed to eliminate itself if it detects that it is running inside a virtual machine, thus reducing its chance of being discovered by security researchers. The stolen data includes cookies from browsers such as Chrome and Safari, as well as files from major cryptocurrency wallets, including Electrum, Coinomi, Exodus, and many others. Furthermore, Atomic Stealer copies the “login.keychain-db” file, which contains sensitive passwords and credentials, and Apple Notes files, further increasing the level of risk for the user.

Best practices for effective protection

Taking preventative measures is essential to defend yourself from Atomic Stealer's action. Users should limit themselves to downloading software from official sources such as the Mac App Store and avoid unverified sites. It is also essential to check the URL of websites to ensure their authenticity and avoid suspicious links. Security practices such as keeping macOS and all applications constantly updated are crucial; Updates often include security patches that protect against emerging threats. Ultimately, built-in features like Gatekeeper in macOS can ensure that only signed and trusted applications are installed, offering an additional layer of protection.

Follow us on WhatsApp for more pills like this

06/09/2024 20:27

Marco Verro

Last pills

Italy's success in cybersecurityHow Italy achieved excellence in global cybersecurity: strategies, collaborations, and international successes

IntelBroker alleged breach of Deloitte systemsServer exposed: how Deloitte's security may have been compromised by a cyber attack

Vo1d infections on Android TV boxes: how to protect your devicesLearn the essential measures to protect your Android TV boxes from the dreaded Vo1d malware and keep your devices safe from cyber threats

Hacker attack in Lebanon: Hezbollah under fireTechnological shock and injuries: cyber warfare hits Hezbollah in Lebanon