• Home
  • About Us
  • Services
    • Global Risk Intelligence
    • Trust & Safety
  • Resources
  • Contact Us
  • Home
  • About Us
  • Services
    • Global Risk Intelligence
    • Trust & Safety
  • Resources
  • Contact Us
Home

Malware: macOS users under threat

Nirjhar Das by Nirjhar Das
September 21, 2023
in Travel Advisory
Reading Time: 2 mins read
0
Malware

Malware Attack

22
VIEWS
Share on FacebookShare on TwitterLinkedinWhatsapp

Unfortunately, macOS users are not immune to malware threats and a new threat targeting this operating system has recently emerged.

A recent study discovered that new malware that steals people’s information is targeting macOS users.

Malware
Malware Attack

The malware named “Atomic macOS Stealer (AMOS)” was created specifically to attack Macs and steal sensitive data from Apple devices.

AMOS malware was discovered on a Telegram app channel that was being marketed to hackers eager to cause mayhem. 

The primary objective of this malware is to infiltrate the user’s device and collect sensitive information such as passwords, system information, files, and documents saved on the desktop.

This malware is frighteningly capable of infiltrating major browsers such as Chrome and Firefox and discreetly taking personal information such as autofill data, passwords, cookies, and even credit card information.

The malware also targets popular cryptocurrency wallets such as Electrum, Binance, and Atomic.

The malware can be purchased through Telegram for $1,000/month.

This malware is distributed using a .dmg file. When the .dmg file is opened, the software may display a bogus prompt that appears to be part of the computer’s system.

The malware may be dangerous, but users can still protect themselves from an attack by following the tips mentioned below:

As the malware requires the user to click on the .dmg file to install, the AMOS malware attacks can be avoided by simply avoiding installing any untrusted software from an unverified source.

Users must also make sure to keep their devices, operating systems, and apps up to date.

Also, having a good antivirus always helps.

Tags: AMOSAntivirusAtomic macOS StealerCyber AttackCyber SecuritymacOSMalwareTelegram
Nirjhar Das

Nirjhar Das

Experienced Manager with a demonstrated history of working in the Web Content Development industry. Skilled in Search Engine Optimization (SEO), Off-Page SEO, Communication, Marketing, Research, Global Risk Intelligence, Trust/Safety and Project Management. Vital operations professional with a Master of Business Administration - MBA focused on Marketing/International Business.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

New York
London
Tel Aviv
Sydney
New Delhi

Mitigating Threats! Intelligence on the Go…

Facebook Twitter Instagram Whatsapp Linkedin Youtube

Company

  • Terms & Conditions
  • Privacy Policy
  • Contact Us

OSINTopedia Infotech Private Limited

Registered under MCA 

contact@osintopedia.com

  • 24.869814, 92.355049

Copyright © 2023   osintopedia.com | Powered by osintopedia.com

OSINTopedia
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
New Letter

hi this is just a sample plz ignore this popup