Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Atomic macOS Stealer Adds Backdoor

July 30, 2025
Reading Time: 3 mins read
in Alerts
Atomic macOS Stealer Adds Backdoor

The Atomic macOS Stealer, commonly known as AMOS, has undergone a significant and alarming transformation. Initially designed as a straightforward information stealer, the malware has now evolved into a sophisticated persistent threat, capable of maintaining long-term, covert access to infected macOS systems. This evolution marks a critical escalation in its capabilities, moving beyond simple data theft to allow attackers to execute remote commands and deploy additional malicious payloads, effectively turning a compromised machine into a remotely controlled asset.

Sophisticated Distribution and Targeting

Attackers deploy AMOS using a two-pronged strategy that combines broad-stroke and highly targeted methods. The first vector involves luring victims through websites offering cracked or counterfeit software, a common tactic to trick users into installing malware. The second, more insidious vector, consists of sophisticated spear-phishing campaigns aimed at high-value targets like cryptocurrency holders and freelance professionals. These campaigns often masquerade as legitimate job interview processes, deceiving individuals into installing trojanized DMG files by requesting system passwords under the guise of enabling screen-sharing software for the “interview.”

Global Reach and Future Threats

The impact of these campaigns is already global. Security analysts have identified that AMOS has affected users in over 120 countries, with the United States, France, Italy, the United Kingdom, and Canada bearing the brunt of the attacks. The malware operates on a malware-as-a-service (MaaS) model, meaning its developers are continuously improving it and selling access to other cybercriminals. This continuous development cycle suggests new features are always on the horizon, with reports indicating that a keylogging function to capture every keystroke is currently under development.

Technical Persistence Mechanisms

AMOS employs advanced techniques to ensure it remains on a system even after a reboot and to hide from the user. It deploys a hidden binary file named .helper in the victim’s home directory, which is launched by a wrapper script called .agent to ensure it runs continuously. To achieve persistence, the malware installs a LaunchDaemon labeled com.finder.helper. This is done using AppleScript, which leverages the user’s stolen credentials to gain the elevated privileges needed to embed itself deep within the operating system. Once active, it communicates with its command-and-control (C2) server via HTTP POST requests every 60 seconds, awaiting new commands.

Evasion and Operational Security
To avoid being discovered by security software or researchers, AMOS utilizes several evasion tactics. It uses string obfuscation to scramble the text within its code, making it difficult to analyze and understand its functions. Furthermore, the malware is designed to be aware of its environment. Before fully executing, it runs the system_profiler command to check if it is operating within a sandbox or a virtual machine—common tools used by security analysts. If it detects such an environment, it may shut down to prevent analysis, showcasing a high degree of operational security and making it a more formidable threat to macOS users worldwide.

Reference:

  • Atomic macOS Stealer Gains New Backdoor, Allowing Hackers to Remotely Access Infected Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025
Unreported Domains Expose Salt Typhoon

Unreported Domains Expose Salt Typhoon

September 10, 2025
Microsoft Warns of AD DS Flaw

Microsoft Warns of AD DS Flaw

September 10, 2025
Microsoft Warns of AD DS Flaw

Hackers Exploit Adobe Commerce Bug

September 10, 2025

Latest Alerts

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Unreported Domains Expose Salt Typhoon

Hackers Exploit Adobe Commerce Bug

Microsoft Warns of AD DS Flaw

Subscribe to our newsletter

    Latest Incidents

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    Nexar Dashcam Database Breached

    Wealthsimple Platform Data Breach

    Cornwell Tools Data Breach Hits 104k

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial