AI DevwWrld Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Malware emergency on macOS: Atomic Stealer's threat to sensitive data and cryptocurrencies

New infection and mitigation techniques to protect Mac devices

Atomic Stealer is a new malware that affects macOS, stealing sensitive data and cryptocurrencies. It spreads as cracked software. It uses AppleScript to obtain passwords and steals data from browsers and cryptocurrency wallets. It is recommended to download from official sources only.

This pill is also available in Italian language

The cybersecurity landscape is constantly evolving, with new threats emerging daily. Users of macOS systems have long been considered relatively safe compared to the digital dangers that often threaten other platforms. However, this perception of security is challenged by recent malware that is targeting their devices. This new malicious code, called Atomic Stealer, exposes users' sensitive data and cryptocurrencies to serious risks, underlining the importance of constantly staying informed and taking adequate cyber protection measures.

Atomic Stealer: how malware works

The discovery of Atomic Stealer has worried specialists in the sector. In-depth studies have revealed the working mechanisms of the malware and the techniques used to infect systems. Atomic Stealer disguises itself as crack files of popular software such as CleanMyMac and Photoshop, tricking users into downloading and installing it. Once executed, the malware is capable of stealing sensitive data from browsers and cryptocurrency wallets on the infected system. The ability to remain hidden and operate without arousing suspicion makes Atomic Stealer a particularly insidious threat.

Advanced data stealing methods

Once installed, Atomic Stealer uses AppleScript to trick users into providing their system passwords, thus allowing even deeper access to the device. The malware is programmed to eliminate itself if it detects that it is running inside a virtual machine, thus reducing its chance of being discovered by security researchers. The stolen data includes cookies from browsers such as Chrome and Safari, as well as files from major cryptocurrency wallets, including Electrum, Coinomi, Exodus, and many others. Furthermore, Atomic Stealer copies the “login.keychain-db” file, which contains sensitive passwords and credentials, and Apple Notes files, further increasing the level of risk for the user.

Best practices for effective protection

Taking preventative measures is essential to defend yourself from Atomic Stealer's action. Users should limit themselves to downloading software from official sources such as the Mac App Store and avoid unverified sites. It is also essential to check the URL of websites to ensure their authenticity and avoid suspicious links. Security practices such as keeping macOS and all applications constantly updated are crucial; Updates often include security patches that protect against emerging threats. Ultimately, built-in features like Gatekeeper in macOS can ensure that only signed and trusted applications are installed, offering an additional layer of protection.

Follow us on Threads for more pills like this

06/09/2024 20:27

Editorial AI

Last pills

Data breach: 560 million users involvedHow to protect yourself from the consequences of a major data breach

Ransomware attack on Synnovis: London health services in crisisSevere disruption to pathology and diagnostic services in London

A new LPE exploit for Windows for sale in the undergroundA new local privilege escalation threat for Windows in the underground forums

Critical failure in Check Point VPN solutions: risks and security measuresExposure of enterprise systems: urgent updates and patches to protect networks