Hackers Weaponize Google Ads with ‘Poseidon’ Mac Stealer!

A new stealer malware named Poseidon is being distributed that targets Mac users by sharing code with the well-known Atomic Stealer and is designed to steal various data, including files, browser information, and credentials from password managers.  

The malware is being distributed through malvertising campaigns with ads disguised as legitimate downloads for the Arc browser.  

The author of this malware, known as Rodrigo4,  previously offered a similar stealer but has rebranded it as Poseidon, likely to improve recognition and potentially attract more users. 

Forum post by Rodrigo4 on XSS

Malvertisers exploited the hype surrounding Arc Browser’s Windows launch by deploying a Google Ads campaign, which disguised official promotions by “Coles & Co.” and displayed the legitimate Arc website (arc.net) but upon clicking, they redirected users to a spoofed download site (arcthost.org), which then further redirected them to another fake site (arc-download.com) offering a non-existent Mac version of Arc, and aimed to trick users into downloading potentially malicious software disguised as the desired Arc browser. 

Malicious ad for Arc browser via Google search

A downloaded DMG file appears to be a standard Mac application installer but lacks the vulnerability that allows bypassing security through a right-click open method, which suggests that the DMG might be malicious, attempting to masquerade as legitimate software while lacking a known exploit for security measures. 

Malicious Arc DMG installer

Researchers at MalwareBytes Labs discovered unfinished code in the new “Poseidon” stealer that suggests additional functionalities beyond its current capabilities. The malware was also recently advertised to target VPN configurations from Fortinet and OpenVPN. 

An excerpt from a forum post reveals a command using curl to send stolen data, including the victim’s machine ID, builder ID, and potentially compressed data (out.zip), to a server under the attackers’ control. 

The IP address in the command leads to a login page for a web interface branded as “Poseidon,” likely a custom control panel for managing stolen information. 

Poseidon panel login page

Mac malware developers are actively creating stealers, which are programs designed to steal user data and are often advertised with features like rich functionality and low antivirus detection rates. 

The recent Poseidon campaign that disseminated a new stealer variant exemplifies the danger that this kind of malware actually poses. 

Users can protect themselves by being cautious when downloading and installing new applications. Security software with web protection features that block malicious ads and websites can be a valuable first line of defense. 

An investigation identified a potential phishing campaign leveraging Google Ads, as the compromised ad domain, arcthost.org, likely redirects users to a decoy site, arc-download.com, which offers a malicious download, Arc12645413.dmg. 

The SHA256 hash, c1693ee747e315419f84dfa89e36ca5b74074044b181656d95d7f40af34a05, suggests that the payload might be malware, and the malware could use the identified C2 server, 79.137.192.4/p2p, to communicate with the attacker. 

Also Read:

Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here