HomeSample Page

Sample Page Title


Atomic Stealer malware advertises itself by ClearFake browser updates disguised as Google’s Chrome and Apple’s Safari.

Anti-malware software program supplier Malwarebytes has described a brand new variant of Atomic Stealer (also referred to as AMOS), which is malware focusing on Apple customers. The brand new malware variant, distributed by the faux browser replace supply mechanism ClearFake, advertises itself as updates for Apple’s Safari browser and Google’s Chrome browser. The malware is able to grabbing a person’s knowledge and sending it to an attacker’s command and management server.

JĆ©rĆ“me Segura, senior director of risk intelligence at Malwarebytes, famous in his publish in regards to the assault that ClearFake is actively being up to date and that its use of good contacts particularly makes it ā€œone of the crucial prevalent and harmful social engineering schemes.ā€

ā€œFaux browser updates have been a typical theme for Home windows customers for years, and but up till now the risk actors didn’t increase onto MacOS in a constant approach,ā€ Segura identified.

Soar to:

Timeline of Atomic Stealer malware

Atomic Stealer was first marketed as a malware supply possibility for risk actors in April 2023. Malwarebytes present in September 2023 that Atomic Stealer was focusing on Mac customers by faux software program updates marketed on Google searches. Atomic Stealer was notably suited to grabbing passwords and Apple keychain codes used for bitcoin wallets. Atomic Stealer may raise bank card info.

Whereas Atomic Stealer had been focusing on Mac customers for a while, ClearFake was traditionally used solely in opposition to Home windows machines. That is exceptional as a result of ClearFake is among the first Home windows social campaigns made for Home windows that then expanded to not solely a distinct geolocation however a distinct working system. Safety researcher Randy McEoin found ClearFake in August 2023.

Safety researcher Ankit Anubhav identified on Nov. 17 that, whereas ClearFake had been seen focusing on Home windows, the Mac model is a brand new growth.

How ClearFake poses as Safari and Chrome updates

ClearFake is a sequence of malicious web sites that purport to supply updates for Safari (Determine A) and Chrome (Determine B). Potential victims will see websites posing as legit browser updates.

Determine A

Fake browser download.
The malicious faux Safari web page might be recognized as spam as a result of its odd spacing and use of older icons. Picture: Malwarebytes

Determine B

Fake browser update.
The faux Chrome replace web page is extra modern. Picture: Malwarebytes

Then, the ClearFake rip-off will ship Atomic Stealer. Victims who click on by to the false updates will obtain a .dmg file that may steal passwords and extract recordsdata.

SEE: Some risk actors have used Apple units for surveillance during the last yr, and it’s a development which will proceed, in keeping with Kaspersky. (TechRepublic)Ā 

Malwarebytes discovered that the next malicious domains are related to this risk:

  • Longlakeweb [dot] com
  • Chalomannoakhali [dot] com
  • Jaminzaidad [dot] cm
  • Royaltrustrbc [dot] com

The AMOS stealer might be recognized utilizing the next indicators:

  • 4cb531bd83a1ebf4061c98f799cdc2922059aff1a49939d427054a556e89f464
  • be634e786d5d01b91f46efd63e8d71f79b423bfb2d23459e5060a9532b4dcc7b

The way to shield in opposition to this malware risk

Safety admins or IT execs ought to hold the next in thoughts to guard staff from ClearFake and Atomic Stealer:

  • Hold your group’s internet safety instruments updated.
  • Remind staff to not obtain purposes from untrusted websites. Mac customers ought to obtain purposes solely from the Mac App Retailer or company-approved areas.
  • Talk clearly about anticipated browser updates and different utility updates.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles