Atomic macOS Stealer - Backdoor allows hackers to remotely access the victim's machine


Atomic macOS Stealer (AMOS) - an infostealer targeting macOS users, has recently made a significant leap from being a simple information-stealing tool to becoming a sophisticated, persistent threat with the ability to maintain long-term access to compromised systems.
Specifically, in a report published on the Polyswarm blog by The Hivemind, it is noted that AMOS has developed a backdoor capable of restarting with the system, allowing remote access, deploying additional malware on the victim's machine, and easily bypassing defenses on macOS systems.
According to the latest statistics, AMOS attack campaigns have affected over 120 countries worldwide, with the US, France, Italy, the UK, and Canada being the most impacted by this information-stealing malware. This malware is mainly spread through two primary channels:
Websites offering cracked software or fake malicious software.
Sophisticated spear-phishing campaigns targeting individuals, especially those holding cryptocurrency, prominent individuals, and freelancers.
One common scenario for spreading AMOS is attacks disguised as job interview processes, tricking victims into installing .DMG
files containing malware, then asking users to enter their system password under the pretense of "activating screen-sharing software." Once the file is executed, AMOS is deployed and begins stealing the victim's sensitive data, such as browser passwords and cryptocurrency wallet seed phrases, while also deploying a backdoor to maintain access to the system. Additionally, security experts warn that a keylogger may be under development alongside AMOS, significantly increasing this malware's ability to steal information.
The Hivemind report also states that to persist longer on the victim's system, AMOS has implemented a series of sophisticated mechanisms as follows:
Install
.helper
, saved as a hidden file in the user's home directory, and deploy a wrapper script named.agent
to ensure the backdoor runs continuously.Create a LaunchDaemon labeled
com.finder.helper
installed via AppleScript to ensure the backdoor starts with the system.Establish communication with the C2 server through HTTP POST requests every 60 seconds.
Use string obfuscation techniques to obscure character strings, and use
system_profiler
to check the sandbox environment and virtualization to avoid detection.
Recommendations & Mitigation
The consequences for macOS users are very serious, as AMOS has far exceeded the limits of traditional information-stealing tools, posing a risk of prolonged intrusion. As AMOS continues to evolve, early user awareness and the implementation of advanced endpoint protection solutions are crucial to safeguarding macOS systems against this persistent and growing threat.
Some measures users can take to prevent and mitigate the risk of information insecurity from this type of malware include:
Use software from reputable, verified providers: Only download software from the App Store or official websites, and avoid cracked software or suspicious links.
Do not open files or links from strange emails or messages, especially if they request your system password.
Regularly update software and security patches: Always update macOS and applications to fix security vulnerabilities.
Use security measures: Install antivirus software for macOS and regularly scan the system.
IOCs
SHA-256 |
8d8b40e87d3011de5b33103df2ed4ec81458b2a2f8807fbb7ffdbc351c7c7b5e |
3402883ff6efadf0cc8b7434a0530fb769de5549b0e9510dfdd23bc0689670d6 |
f4976d9a90d2f9868fcaade1449ffcf9982ed2285ace90aafa7099ce246fd2ec |
54b9576aad25d54d703adb9a26feaa5d80f44b94731ff8ecff7cf1ebc15cf3ff |
11e55fa23f0303ae949f1f1d7766b79faf0eb77bccb6f976f519a29fe51ce838 |
ec11fd865c2f502c47f100131f699a5e0589092e722a0820e96bd698364eefdb |
References
Subscribe to my newsletter
Read articles from Nam Anh Mai D. directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
