{"id":100320,"date":"2024-04-19T09:28:47","date_gmt":"2024-04-19T16:28:47","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100320"},"modified":"2024-12-07T00:24:55","modified_gmt":"2024-12-07T08:24:55","slug":"cloudchat-infostealer-mac-malware-masquerades-as-safe-service","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/","title":{"rendered":"CloudChat infostealer Mac malware masquerades as &#8220;safe&#8221; service"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100321\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>Researchers recently discovered that a supposed chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims&#8217; Macs. The malware also opened up a backdoor, allowing the developer to remotely control infected Macs and secretly run Terminal commands.<\/p>\n<p>Sometime after the researchers published a write-up about the malware, the chat app site changed. It no longer offers the same version of the app. Here&#8217;s what we know about the story so far.<\/p>\n<h3>What is the CloudChat infostealer malware, and what does it do?<\/h3>\n<p>On April 3, malware researchers Adam Kohler and Christopher Lopez <a href=\"https:\/\/blog.kandji.io\/cloudchat-infostealer\" target=\"_blank\" rel=\"noopener nofollow\">discovered<\/a> an interesting file that had been upload to VirusTotal that day. VirusTotal is a site that allows anyone to scan a file with multiple antivirus engines to see which ones detect it as potentially dangerous; files uploaded to the site are available for malware researchers to download.<\/p>\n<p>The same DMG (macOS disk image) that contained the file was also available on the official CloudChat site.<\/p>\n<p>When a victim runs the app, it checks whether the system&#8217;s IP address implies that the Mac is in China. If so, it avoids downloading a malicious payload.<\/p>\n<p>If, however, the victim&#8217;s Mac doesn&#8217;t appear to be in China, it surreptitiously downloads and runs the second-stage payload. The payload is an app that hides in the user&#8217;s home folder; its name starts with a period character so it won&#8217;t be visible in the macOS Finder.<\/p>\n<p>The app then collects information about the infected Mac and sends them to a Telegram user. It then starts watching for any Bitcoin, Ethereum, or TRON crypto private keys the user may copy to the clipboard. If the victim happens to copy one, the malware exfiltrates it to the malware developer via Telegram.<\/p>\n<p>The malware also checks the Mac for common Google Chrome cryptocurrency wallet extensions. If it finds any, it creates a compressed archive and exfiltrates them to the attacker&#8217;s FTP server.<\/p>\n<p>Sometime after these initial stages, an attacker may leverage the software&#8217;s backdoor functionality. They may manually send commands and remotely control the infected Mac.<\/p>\n<h3>What happened after the researchers published their write-up?<\/h3>\n<p>Sometime after the original write-up went live, the operators of the CloudChat site evidently removed the malicious version of the Mac app.<\/p>\n<p>Instead of the malicious version that they apparently created on April 2, 2024, they reverted back to an old version. As of when this article is being published, the app that the site is currently distributing via its CloudChat.dmg appears to have been created on June 22, 2022. It was first uploaded to VirusTotal on July 2, 2023.<\/p>\n<h3>Malware aside, is CloudChat trustworthy?<\/h3>\n<p>The official CloudChat site throws around a lot of buzzwords to give the perception of being safe; they claim it &#8220;provides you with a safe social life service,&#8221; that it&#8217;s &#8220;private and secure social,&#8221; &#8220;is encrypted,&#8221; &#8220;[protects] your messages, files, etc. from hackers,&#8221; and lets you exchange &#8220;encrypted personal and trade secrets.&#8221;<\/p>\n<p>But should you trust the current (old) version of the app? No, absolutely not. Even in the best-case scenario\u2014giving the developer the benefit of the doubt and assuming their site had been hacked\u2014there are far too many red flags.<\/p>\n<p>While the newer (confirmed to be malware) version of the app was self-signed, the older version is not even code-signed at all. Normally, legitimate developers get an Apple Developer ID and have Apple notarize their apps before distributing them.<\/p>\n<p>The site offers no way to contact the company via telephone, e-mail, or form; there&#8217;s just a line in the User Agreement stating that &#8220;you can contact us through the official channel of CloudChat.&#8221; Obviously, that isn&#8217;t feasible if you don&#8217;t trust the app enough to install it in the first place.<\/p>\n<p>And there&#8217;s absolutely zero detail about the encryption they supposedly use.<\/p>\n<p>These are just some of the red flags; this is by no means even a comprehensive list.<\/p>\n<h3>Which chat apps are actually safe to use?<\/h3>\n<p>It&#8217;s best to stick with trusted chat applications\u2014ideally one that uses end-to-end encryption by default.<\/p>\n<p>If you just need to message other iPhone or Mac users, Apple&#8217;s own <strong>iMessage<\/strong> is a great solution.<\/p>\n<p>As for cross-platform options, <strong>Signal<\/strong> and <strong>Threema<\/strong> are among the most trusted options.\u00a0<strong>WhatsApp<\/strong> is another popular app that offers encrypted chats (using Signal&#8217;s technology); however, Meta owns WhatsApp, along with Facebook and Instagram, and the company doesn&#8217;t have the best track record on privacy.<\/p>\n<p>Learn more about these and other legitimate messaging apps in our article about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\">encrypted messaging apps for Mac, iPhone, and iPad<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"bQpw7lcqG1\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\">5 Encrypted Messaging Apps for Mac, iPhone, and iPad<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;5 Encrypted Messaging Apps for Mac, iPhone, and iPad&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/embed\/#?secret=bQpw7lcqG1\" data-secret=\"bQpw7lcqG1\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from malware?<\/h3>\n<p>If you think you may have malware on your Mac, it&#8217;s a good idea to scan it with a trusted antivirus.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware and potentially unwanted apps (PUA).<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs. And it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. To get started, just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We discussed the CloudChat infostealer on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-can-take-over-your-phone-by-sim-swapping-intego-mac-podcast-episode-340\/\">episode 340<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe style=\"width: 100%; max-width: 660px; overflow: hidden; border-radius: 10px;\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/episode-340-how-hackers-can-take-over-your-phone-by\/id1293834627?i=1000652837974\" height=\"175\" frameborder=\"0\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\"><\/iframe><\/p>\n<p>If you&#8217;d like more technical details about CloudChat malware, see Kohler and Lopez&#8217;s <a href=\"https:\/\/blog.kandji.io\/cloudchat-infostealer\" target=\"_blank\" rel=\"noopener nofollow\">original write-up<\/a>.<\/p>\n<p>Be sure to also check out Intego&#8217;s past articles about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">Mac and iPhone malware<\/a>, including our articles specifically about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer malware<\/a>, and our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-mac-and-iphone-malware-of-2023-and-what-to-expect-in-2024\/#forecast\">2024 Apple malware forecast<\/a>.<\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A self-proclaimed \u201csecure\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.<\/p>\n","protected":false},"author":14,"featured_media":100323,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,4722,3364],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A self-proclaimed \u201csecure\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CloudChat infostealer Mac malware masquerades as &quot;safe&quot; service - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A self-proclaimed \u201csecure\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T16:28:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-07T08:24:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"CloudChat infostealer Mac Trojan horse malware app\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/\",\"name\":\"CloudChat infostealer Mac malware masquerades as \\\"safe\\\" service - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#primaryimage\"},\"datePublished\":\"2024-04-19T16:28:47+00:00\",\"dateModified\":\"2024-12-07T08:24:55+00:00\",\"description\":\"A self-proclaimed \\u201csecure\\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CloudChat infostealer Mac malware masquerades as &#8220;safe&#8221; service\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"CloudChat infostealer Mac malware masquerades as &#8220;safe&#8221; service\",\"datePublished\":\"2024-04-19T16:28:47+00:00\",\"dateModified\":\"2024-12-07T08:24:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#webpage\"},\"wordCount\":1087,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg\",\"keywords\":[\"Malware\",\"Stealer Malware\",\"Telegram Messenger\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A self-proclaimed \u201csecure\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/","og_locale":"en_US","og_type":"article","og_title":"CloudChat infostealer Mac malware masquerades as \"safe\" service - The Mac Security Blog","og_description":"A self-proclaimed \u201csecure\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-04-19T16:28:47+00:00","article_modified_time":"2024-12-07T08:24:55+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg","width":400,"height":260,"caption":"CloudChat infostealer Mac Trojan horse malware app"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/","name":"CloudChat infostealer Mac malware masquerades as \"safe\" service - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#primaryimage"},"datePublished":"2024-04-19T16:28:47+00:00","dateModified":"2024-12-07T08:24:55+00:00","description":"A self-proclaimed \u201csecure\u201d chat app, CloudChat, surreptitiously stole crypto keys and wallets from victims\u2019 Macs and installed backdoor malware. Learn more, including which messaging apps are actually safe to use.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"CloudChat infostealer Mac malware masquerades as &#8220;safe&#8221; service"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"CloudChat infostealer Mac malware masquerades as &#8220;safe&#8221; service","datePublished":"2024-04-19T16:28:47+00:00","dateModified":"2024-12-07T08:24:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#webpage"},"wordCount":1087,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg","keywords":["Malware","Stealer Malware","Telegram Messenger"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/cloudchat-infostealer-mac-malware-masquerades-as-safe-service\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/CloudChat-infostealer-Mac-malware-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-q64","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100320"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100320"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100320\/revisions"}],"predecessor-version":[{"id":100328,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100320\/revisions\/100328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100323"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}