Password Stealing Malware Rapidly Attacking macOS Users

Cybersecurity researchers have identified a significant rise in malware targeting macOS users, with infostealers emerging as the most prevalent threat.

These malicious programs, including Atomic Stealer, Poseidon Stealer, and Cthulhu Stealer, are designed to exfiltrate sensitive data such as passwords, financial details, and cryptocurrency wallets.

Infostealers exploit macOS’s AppleScript framework to bypass security measures and deceive users into providing credentials through fake system prompts.

macOS Users
Poseidon Stealer prompts the victim with a dialog box in an attempt to get the password.

This tactic enables attackers to harvest critical information, often leading to data breaches, financial losses, and reputational damage.

Key Malware Families Targeting macOS

Atomic Stealer

First identified in 2023, Atomic Stealer is distributed as malware-as-a-service (MaaS) on hacker forums and Telegram.

This malware is typically spread via malvertising campaigns and disguised as legitimate software installers.

It targets browser data, cryptocurrency wallets, instant messaging platforms like Telegram, and sensitive documents.

Atomic Stealer uses fake prompts to extract system credentials and stores stolen data for further exploitation.

Poseidon Stealer

Poseidon Stealer emerged as a fork of Atomic Stealer and gained traction in 2024.

macOS Users
Example of a Poseidon Stealer control panel login page.

Distributed through Trojanized installers via malicious ads and spam emails, Poseidon employs encoded AppleScript files to execute its operations.

It focuses on stealing browser cookies, passwords, cryptocurrency wallet information, and data from password managers like BitWarden and KeePassXC.

The stolen information is transmitted to attacker-controlled servers for monetization or additional attacks.

Cthulhu Stealer

Cthulhu Stealer operates similarly but with an expanded target range.

Distributed via fake software installers such as “CleanMyMac,” it deceives users with prompts requesting system or cryptocurrency wallet passwords.

This malware collects browser credentials, keychain data, Telegram files, and even gaming-related information from platforms like Battle.net and Minecraft.

Stolen data is stored locally before being uploaded to a command-and-control server.

The surge in macOS-targeted malware highlights the evolving tactics of cybercriminals who are increasingly exploiting the platform’s growing adoption in corporate environments.

Infostealers not only compromise sensitive information but also serve as entry points for more severe threats like ransomware.

To combat these threats, security experts recommend implementing multi-layered defense strategies that include:

  • Restricting AppleScript permissions
  • Enhancing endpoint detection capabilities
  • Conducting user training on phishing and social engineering risks
  • Regularly updating software to patch vulnerabilities

A report by Palo Alto Networks’ Unit 42 revealed a staggering 101% increase in macOS infostealer activity during the second half of 2024, underscoring the growing vulnerability of Apple’s operating system.

The rise of infostealers serves as a stark reminder that no operating system is immune to cyberattacks. Proactive measures are essential to safeguard sensitive data against these rapidly evolving threats.

Also Read:

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here