Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New macOS malware ‘Cthulhu Stealer’ targets Apple user data
Global Security

New macOS malware ‘Cthulhu Stealer’ targets Apple user data

AdminBy AdminAugust 23, 2024No Comments3 Mins Read
macOS Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 23, 2024Ravi LakshmananEndpoint Security / Data Privacy

macOS malware

Cyber ​​security researchers have discovered a new information stealer that is designed to attack Apple macOS hosts and collect a wide range of information, highlighting the increasing focus of threat actors on the operating system.

The malware, called Cthulhu Stealer, has been available under a malware-as-a-service (MaaS) model for $500 per month since late 2023. It is capable of targeting both x86_64 and Arm architectures.

“Cthulhu Stealer is an Apple disk image (DMG) that comes bundled with two architecture-specific binaries,” Cato Security researcher Tara Gould. said. “The malware is written in Golang and pretends to be legitimate software.”

Some of the programs it embodies include CleanMyMac, Grand Theft Auto IV, and Adobe GenP, the latter of which is an open-source tool that fixes Adobe apps to bypass the Creative Cloud service and activate them without a serial key.

Cyber ​​security

Users who end up running an unsigned file after explicitly allowing it to run, i.e. bypassing Gatekeeper protection, are prompted for their system password, osascript based technique which was succeeded by Atomic Stealer, Cuckoo, MacStealer and Banshee Stealer.

The next step will present a second MetaMask password prompt. Cthulhu Stealer is also designed to collect system information and reset iCloud Keychain passwords using an open source tool called Chain breaker.

The stolen data, which also consists of web browser cookies and Telegram account information, is compressed and stored in a ZIP archive file before being sent to the control server (C2).

macOS malware

“The primary function of Cthulhu Stealer is to steal credentials and cryptocurrency wallets from various stores, including game accounts,” Gould said.

“The functionality and features of Cthulhu Stealer are very similar to Atomic thiefindicating that the developer of Cthulhu Stealer probably took Atomic Stealer and changed the code. The use of osascript to prompt the user for a password is similar to Atomic Stealer and Cthulhu, even with the same spelling mistakes.’

The threat actors behind the malware are said to be no longer active, in part due to a payment dispute that led to allegations of fraud by affiliates, resulting in the main developer being permanently banned from the cybercrime marketplace, which was used to advertise the hijacker.

Cthulhu Stealer is not particularly sophisticated and has no anti-analysis techniques that would allow it to work stealthily. It also lacks any standout features that set it apart from other similar offerings in the underground.

Cyber ​​security

While macOS threats are far less common than Windows and Linux, users are advised to only download software from verified sources, stay away from installing unverified programs, and keep their systems up-to-date with the latest security updates.

The spike in macOS malware hasn’t gone unnoticed by Apple, which earlier this month announced an update to its next version of the operating system that aims to increase problems when trying to open software that isn’t properly signed or notarized.

“In macOS Sequoia, users will no longer be able to press Control to override Gatekeeper when opening software that is not properly signed or notarized,” Apple. said. “They will need to visit System Preferences > Privacy & Security to review the software’s security information before allowing it to run.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.