Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

MacOS malware: s new threat for Apple users

A sophisticated threat that endangers the security of Apple devices and sensitive user data

The Atomic Stealer malware for MacOS manages to bypass the Gatekeeper, the operating system's security. It is distributed via Google ads and presents itself as TradingView platform to lure victims. Once downloaded, it convinces victims to give up their password. Users should be careful to download apps only from trusted sources.
This pill is also available in Italian language

The recent Atomic Stealer malware for MacOS recently showed off a new ability: being able to bypass the Gatekeeper, the operating system's security feature. This discovery was made by Malwarebytes researchers, who noticed the malware update. Atomic Stealer is an infostealer designed to capture passwords, Apple keychains, files, crypto wallets and more.

Distribution method via Google ads

Criminals using this malware mostly distribute it through illegitimate or cracked software files. However, they also employ other tactics, such as disguising themselves as legitimate websites and taking advantage of ads displayed on search engines, such as Google, in order to lure victims. This was revealed by Jérôme Segura, a researcher at Malwarebytes. In a recent distribution campaign identified, the malware presented itself as the TradingView platform, which is very popular for monitoring financial markets. Potential victims were redirected by malicious ads to a phishing site that mimicked the legitimate platform's page.

Gatekeeper infection and bypass process

Within the phishing site, the page featured three download buttons. Those dedicated to Windows and Linux users activated the download of a RAT from Discord, while the one for Mac users downloaded Atomic Stealer from a third-party site. Once downloaded, the malware instructs the user how to open the file. However, the user is unaware that this process is aimed at bypassing the MacOS Gatekeeper. Unlike regular apps, malware does not have to be copied to your Mac's Apps folder, but is mounted and executed as an ad hoc signed file. Through an endless cycle of password requests, the malware convinces victims to give it up.

Rise in popularity of MacOS malware

In recent years, cybercriminals have exploited Google search ads as a tool to direct users to websites that appear legitimate but actually distribute malware. With the growing use of Mac devices by consumers and businesses, Apple machines have become an attractive target for malware authors. While Mac malware is not yet as widespread as Windows malware, the developers of the Atomic Stealer toolkit have demonstrated remarkable ability to evade detection. Therefore, it is important for users to be careful when downloading apps or programs, avoiding doing so from unofficial or untrustworthy sources such as third-party sites.

Follow us on Twitter for more pills like this

09/07/2023 13:16

Marco Verro

Complementary pills

Google Ads: unwitting vehicle for spreading malwareTrojans Glupteba and Vidar target via Google Ads

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated