Mac users need to be careful as hackers are now selling a new type of malware called the Atomic macOS Stealer (AMOS) on the dark web and telegram according to a report from Cyble Research and Intelligence Labs (CRIL). This malware is specifically designed to steal all your personal data if you have a macOS machine.
The AMOS malware is capable of stealing a lot of data from your Mac, including passwords, system information, files from your desktop, and documents saved on your computer. It can even steal your macOS password, which means that the hackers will have complete access to your system.
In addition to stealing your personal data, the malware can also target multiple browsers and steal your auto-fills, passwords, cookies, wallets, and credit card information. This means that it can even steal data from popular crypto wallets like Electrum, Binance, Exodus, Atomic, and Coinomi.
The threat actors behind the sale of the malware are charging $1000 per month for access to it. They are also providing additional services such as a web panel for managing victims, meta mask brute-forcing for stealing seed and private keys, crypto checker, and dmg installer. This suggests that the hackers are highly organized and constantly improving the capabilities of the malware to make it more effective.
By following these simple tips, you can significantly reduce the risk of falling victim to the AMOS malware or other online threats-
- Keep your system and security software up to date to ensure that your system is protected against known vulnerabilities.
- Use a reputable antivirus and anti-malware software to detect and remove any malware that may have infected your system.
- Be cautious when downloading files from unknown sources and only download files from trusted sources.
- Avoid clicking on links or images shared via email or SMS unless you are sure they are safe.
- Consider using real-time-based malware-blocking tools to protect your system by blocking known threats in real-time.
It's important for Mac users to protect themselves from this type of attack. Always be cautious when downloading files from unknown sources, regularly update your system and security software, and avoid using public Wi-Fi networks without a VPN. Additionally, use a password manager and enable two-factor authentication wherever possible.