AI
AI

Infostealers Navigate macOS to Steal Crypto Wallets and Browser Credentials

Photo credit: www.darkreading.com

A new infostealer is emerging on the cybersecurity landscape, seeking to exploit vulnerabilities in macOS environments while leveraging the success of existing malware tools. Cado Security has highlighted the “Cthulhu Stealer,” a recent cybersecurity threat aimed at targeting cryptocurrency wallets and gaming credentials through deceptive means.

Cthulhu Stealer, as outlined in a recent blog post, is an Apple disk image (DMG) created using the Golang programming language. It typically masquerades as legitimate software, including well-known applications such as the CleanMyMac tool or the Grand Theft Auto video game. Upon execution, it prompts the user for both the system password and their Metamask cryptocurrency wallet password, presenting a deceptive scenario that users may not immediately recognize as suspicious.

Tara Gould, a threat researcher at Cado Security, notes the potential dangers, particularly given the demographics likely to interact with such applications. Younger users or those less experienced with technology may overlook the warning signs, making them vulnerable to these kinds of attacks.

Once Cthulhu Stealer has been installed, it begins to harvest critical system information like IP addresses and OS versions, ultimately focusing on extracting credentials from various applications. Its targeted portfolio includes popular crypto wallets such as Coinbase and Binance, alongside gaming platforms like Battle.net and Minecraft.

Despite its selling price of $500 per month on cybercrime forums, Cthulhu Stealer lacks advanced stealth methods and merely replicates techniques found in existing malware solutions.

Case Study: Cthulhu Stealer

Notably, Cthulhu Stealer closely resembles Atomic Stealer, its forerunner, sharing similar functionalities and even typos in the original code. While Atomic Stealer is not particularly innovative—it has been characterized as ‘smash and grab’ due to its lack of persistence mechanisms—it has nonetheless become one of the most widely recognized infostealers worldwide.

According to a report from Red Canary, Atomic Stealer was recently ranked as the sixth most prevalent malware. This ranking places it alongside well-known threats like SocGholish and Cobalt Strike, highlighting the growing visibility of macOS threats within the cybersecurity landscape.

Brian Donohue, a principal information security specialist with Red Canary, remarked on the significance of any macOS threat making it into the top ranks of malware, suggesting organizations with a substantial number of macOS devices might already be susceptible to such vulnerabilities.

The Road Atomic Stealer Paved

Currently, macOS threats remain less prevalent compared to their Windows and Linux counterparts, with research indicating that only about 6% of malware targets these systems. However, as enterprises increase their use of macOS devices, the potential for rising threats becomes a real concern.

Gould points out that while hackers have not fully shifted focus from Windows systems, the trend may change, especially as the security community has historically overlooked macOS exploitation risks. Jake King, head of threat and security intelligence at Elastic, also noted minimal growth in macOS threats over the past year, indicating that while significant spikes are not currently observed, novel exploitation techniques are emerging.

As malware like Atomic Stealer gains recognition, defenders may find themselves at a disadvantage due to years of relative disinterest from the cybersecurity community in protecting macOS systems.

Donohue emphasizes that organizations using macOS often find their users are highly privileged or managing sensitive information. This poses additional risks, compounded by a lack of expertise in handling macOS-specific threats. Moreover, standard security tools that began as Windows-centric are now being adapted for macOS, but their effectiveness in this environment is still under scrutiny.

In summary, as the security landscape evolves, ensuring robust protective measures is crucial. King advises that practical access permissions, thorough hardening controls, and monitoring capabilities are essential for safeguarding macOS systems effectively.

Source
www.darkreading.com

Related by category

Navigating the CISO Cloud Security Dilemma: Purchase, Build, or a Combination of Both?

Photo credit: www.csoonline.com Cloud security is not solely focused on...

Cyberkriminelle optimieren ihre Angriffsstrategien.

Photo credit: www.csoonline.com Cyberkriminalität zielt zunehmend auf kleine und mittelständische...

CNAPP-Kaufberatung

Photo credit: www.csoonline.com Cloud-Sicherheit bleibt ein anspruchsvolles Thema, vor allem,...

Latest news

Panchayat Makes History as the First Series Featured at WAVES 2025

Photo credit: www.news18.com Last Updated:May 01, 2025, 11:02 ISTPanchayat is...

April 30: CBS News 24/7 at 4 PM ET

Photo credit: www.cbsnews.com Economic Concerns Grow as U.S. Economy Contracts Recent...

Your Wait Is Finally Over: New Leak Reveals Galaxy S25 Edge Launching This Month!

Photo credit: www.androidcentral.com What you need to know The Galaxy S25...

Breaking news