	{"id":100410,"date":"2024-05-02T11:48:58","date_gmt":"2024-05-02T18:48:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100410"},"modified":"2024-08-08T19:07:21","modified_gmt":"2024-08-09T02:07:21","slug":"intego-discovers-new-atomic-stealer-amos-mac-malware-variants","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/","title":{"rendered":"Intego discovers new Atomic Stealer (AMOS) Mac malware variants"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100415\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-600x400-1.jpg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p>In <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\">May 2023<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-data-stealer-malware-roundup-atomicstealer-metastealer-realst-all-active-in-september\/\">September 2023<\/a>, and again in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">February 2024<\/a>, we wrote about earlier variants of the <strong>Atomic Stealer<\/strong> Mac malware family. This malware\u2014also known as Atomic macOS Stealer or <strong>AMOS<\/strong> for short\u2014is designed to exfiltrate sensitive data from infected Macs. Such data typically includes saved passwords, cookies, autofill text, and cryptocurrency wallets.<\/p>\n<p>AMOS is distributed in the form of Trojan horses, often masquerading as supposedly pirated or &#8220;cracked&#8221; versions of apps. In recent months, AMOS Trojan horses often pretend to be the legitimate apps they mimic; they employ elaborate campaigns, leveraging malicious Google Ads that link to lookalike homepages with Trojan downloads.<\/p>\n<p>Over the past two weeks, Intego has been tracking several new variants of Atomic Stealer. Here&#8217;s everything you need to know about them and how to stay protected.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#mimicry\">Mimicry of File Juicer, Debit &amp; Credit, Parallel NFT game, and Notion<\/a><\/li>\n<li><a href=\"#source\">Source of these new AMOS infections<\/a><\/li>\n<li><a href=\"#embeds\">Malware embedded within malware<\/a><\/li>\n<li><a href=\"#staysafe\">How can I keep my Mac safe from AMOS and other malware?<\/a><\/li>\n<li><a href=\"#iocs\">Indicators of compromise (IOCs)<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"mimicry\"><\/a><\/li>\n<\/ul>\n<h3>Mimicry of File Juicer, Debit &amp; Credit, Parallel NFT game, and Notion<\/h3>\n<p>The latest variants of AMOS masquerade as several different apps, all distributed through DMG disk images.<\/p>\n<h4><strong>Fake &#8220;File Juicer&#8221; and &#8220;Debit &amp; Credit&#8221; app installers<\/strong><\/h4>\n<p>At least two disk images, when mounted, include a single app called &#8220;AppleApp&#8221; with an icon that implies that it&#8217;s an installer.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100411\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/AtomicStealer-AMOS-AppleApp-202404-600x328-1.jpg\" alt=\"\" width=\"600\" height=\"328\" \/><\/p>\n<p>One fake-installer variant launches a Trojanized version of File Juicer, an app for extracting embedded files from various document formats. The real app costs $19.<\/p>\n<p>A second fake-installer variant launches a Trojanized version of Debit &amp; Credit, a personal finance app that&#8217;s normally only available through the Mac App Store. The real app is a free download, but a &#8220;premium version&#8221; is available via a $19.99 in-app purchase.<\/p>\n<h4><strong>Fake &#8220;Parallel&#8221; NFT TCG game<\/strong><\/h4>\n<p>Another disk image, when mounted, includes a single app called &#8220;WorldParallel.&#8221; With a little investigation, we discovered that this Trojan mimics a Windows-only, NFT-based digital trading card game called Parallel, which its developer describes as &#8220;a Sci-Fi world and Card Game.&#8221;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100412\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/AtomicStealer-AMOS-WorldParallel-202404-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>It isn&#8217;t surprising to see malware disguise itself as something related to non-fungible tokens (NFTs), blockchains, or cryptocurrency; fake crypto wallet apps are another common Trojan horse. We&#8217;ve even observed stealer malware that was distributed through <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-stealer-malware-realst-disguises-itself-as-video-games-is-macos-sonoma-ready\/\">elaborate video-game marketing campaigns<\/a>.<\/p>\n<p>This is because a primary goal of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer malware<\/a> is typically to attempt to exfiltrate digital wallets, which may contain valuable assets such as cryptocurrencies or rare digital artwork.<\/p>\n<h4><strong>Fake &#8220;Notion&#8221; app<\/strong><\/h4>\n<p>And last but not least, we&#8217;d be remiss if we didn&#8217;t mention that, once again, some AMOS samples mimicked the Notion productivity software.<\/p>\n<p>We mentioned in February that AMOS had been spreading via <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">malicious Google Ads that mimicked real Notion software ads<\/a>.<a name=\"source\"><\/a><\/p>\n<h3>Source of these new AMOS infections<\/h3>\n<p>Although we have not definitively confirmed the original source of these infections, it&#8217;s likely that the team behind AMOS is up to its usual tricks, including <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">Google Ads poisoning<\/a>. Threat actors often pay Google for top placement, with sponsored ads disguised as real ads for legitimate software. These ads appear immediately above the actual search results; if you aren&#8217;t careful, you could inadvertently visit a malware distribution site instead of landing on the real software developer&#8217;s site.<\/p>\n<p><strong>We recommend that consumers get out of the habit of &#8220;just Google it&#8221; to find legitimate sites.<\/strong> Such habits often include clicking on the first link without giving it much thought, under the assumption that Google won&#8217;t lead them astray, and will give them the correct result right at the top. Malware makers know this, of course, and that&#8217;s why they&#8217;re paying Google for the number-one position.<\/p>\n<p>Until or unless Google does a much better job of vetting its ads, a better practice than &#8220;Google it&#8221; would be to <strong>bookmark trusted sites whenever possible<\/strong>, and to go back to those bookmarks in the future.<a name=\"embeds\"><\/a><\/p>\n<h3>Malware embedded within malware<\/h3>\n<p>One interesting observation from Intego&#8217;s malware analysis lab is that many of the initial stage (dropper) apps contain the secondary payload embedded within them.<\/p>\n<p>In some cases, the embedded payload was unobfuscated (i.e. plainly visible). However, in other cases, the embedded payload was Base64 encoded, in a weak attempt to hide the payload from antivirus software.<\/p>\n<p>&#8220;Droppers&#8221; are initial-stage malware samples designed to obtain and install additional malware. Typically, droppers connect to malicious or hacked sites to obtain their next-stage payloads. Embedding payloads within the dropper itself can sometimes allow malware campaigns to succeed for a bit longer. This is because sites that host malware may be taken offline quickly, or disinfected and patched as soon as the site owner becomes aware of the infection. In the case of a newly registered malicious domain, the registrar may retake control of the domain, take it offline, and revoke the purchaser&#8217;s access.<a name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from AMOS and other malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects these samples as <strong>OSX\/Amos.ext<\/strong>, <strong>virus\/OSX\/AVI.AMOS.jlei<\/strong>, <strong>virus\/OSX\/AVI.AMOS.lydw<\/strong>, <strong>virus\/OSX\/AVI.AMOS.mlhs<\/strong>, and similar names.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. To get started, just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>As is typical, some of the Atomic Stealer samples we encountered have a very low detection rate on the multi-engine single file scanning site VirusTotal. For several samples, only 5\u20138 out of 60+ antivirus engines appear to detect them. At least three samples (two Mach-O binaries and one DMG disk image) were completely undetected when first uploaded to VirusTotal.<\/p>\n<p>Following are SHA-256 hashes of malware samples related to these new AMOS malware campaigns:<\/p>\n<pre>8ef8fd7284843ab9e9309324a1eb9244850d9c2509ce9688dbf18f41c1370c4d\r\n1dc2465654b7c5975d759649f023836c2af44c6a2936a71aad7e4e6c04fc0de9\r\n8dd270c85f193617cd19ee268f852a8a19c90d470d1111b0ec50196087514277\r\n78b7578fd77e6b3ea104f4c9f62c35fca5598caa430846c818b9e75540e10ef4\r\n8e2d24aa70563688a80426d542883f45387cd093a2223fbd1320ecb95769fdf2\r\nc405178e388752c5723e4dacde8b328abae15a7b953b438160d3e91a4386533f\r\n6881e8b2c584e4b2fe05af6b501d5f4a6e43a7890d36b6da6b5342313cb5ce4e\r\nf747be2535bb146e1c7737dfc7c025419c92a877d7b51033eb3c48e6c08ce7cb\r\n7944a8c9445c74975f14ebeee6ae5f1f7a50b39e5d4b478c645744b661754858\r\n4d5e9d97e48a72639193b9dd4c0bcced376bde7943b87f0aea5333021c0cb073\r\n9b0795e9b965b64a8931a8f9a7ac6ebd26f5dd7d70adaea7be13b04bfe56f6d5\r\n34053a4fcddc5c3553eb9d988b32bc7bddae2ac63fdfc5b00a8270047706bd24\r\nfb34bf9a66ff444c3a83b614af1ee2c5771cf21a676155207f1eefe52b89d2f1\r\nceb7c1a06a4c938a65d97aedbe2e18ca333f71827a015a0342ba1c13734c2032\r\nd02aee0fc3c03558eaf99afd8d54424e59f7aa6c957bc49126484ad3071472dd\r\n399614070ed2a44857d153979ee1ea0e2b05731d22409dede07b39d0869bcc90\r\n1167f14f456e4bb54dc23fe858b571832fbb4e4801c883e134ba01270e6ef6b6\r\nfdaaa25cc6be47bc893f773fcd7c0d8ad6c3618bf931f4b728eb5a1d920527f5\r\n55e587ea12e590e70c500643cf2555a98edd00f90ee19aee0089998faf017b96\r\n379fc1ec90b98ac4312184fda5a810ac7114e39385901103ca07dd22bb5382f1\r\n88b5d4ec8b8ccc4d2b791317e1be6a24db98175af4c9f42d6a7cc277a0012b58\r\n8c922dead9372c87c08f2e25f96538154be922a1511bb947e631b2d4a31bba2a\r\nd1b0fc3d03b4e6cd14b430daf0361989b8a65e87c30d5ea7436b1d51864114b6<\/pre>\n<p>The following domains have recently been used in connection with these AMOS samples:<\/p>\n<pre>dowlosutr[.]click\r\nfarmfrnd[.]com\r\ntarafe[.]com<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers may have attempted to contact one of these domains recently, which could indicate a possible infection.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>Be sure to also check out our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-mac-and-iphone-malware-of-2023-and-what-to-expect-in-2024\/#forecast\">2024 Apple malware forecast<\/a> and our previous <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">Mac malware articles<\/a> from 2024 and earlier.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.<\/p>\n","protected":false},"author":14,"featured_media":100417,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4737,4615,86,4722],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego discovers new Atomic Stealer (AMOS) Mac malware variants - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-02T18:48:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T02:07:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"cryptocurrency stealer Mac malware blue\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/\",\"name\":\"Intego discovers new Atomic Stealer (AMOS) Mac malware variants - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#primaryimage\"},\"datePublished\":\"2024-05-02T18:48:58+00:00\",\"dateModified\":\"2024-08-09T02:07:21+00:00\",\"description\":\"Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego discovers new Atomic Stealer (AMOS) Mac malware variants\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Intego discovers new Atomic Stealer (AMOS) Mac malware variants\",\"datePublished\":\"2024-05-02T18:48:58+00:00\",\"dateModified\":\"2024-08-09T02:07:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#webpage\"},\"wordCount\":1234,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg\",\"keywords\":[\"Atomic Stealer\",\"Malvertising\",\"Malware\",\"Stealer Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/","og_locale":"en_US","og_type":"article","og_title":"Intego discovers new Atomic Stealer (AMOS) Mac malware variants - The Mac Security Blog","og_description":"Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-05-02T18:48:58+00:00","article_modified_time":"2024-08-09T02:07:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg","width":400,"height":260,"caption":"cryptocurrency stealer Mac malware blue"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/","name":"Intego discovers new Atomic Stealer (AMOS) Mac malware variants - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#primaryimage"},"datePublished":"2024-05-02T18:48:58+00:00","dateModified":"2024-08-09T02:07:21+00:00","description":"Atomic Stealer (AMOS) has had brand-new, active Mac malware campaigns over the past two weeks. Intego has exclusive coverage of the latest threats, how to avoid them, and how to clean an infection from your Mac.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego discovers new Atomic Stealer (AMOS) Mac malware variants"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Intego discovers new Atomic Stealer (AMOS) Mac malware variants","datePublished":"2024-05-02T18:48:58+00:00","dateModified":"2024-08-09T02:07:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#webpage"},"wordCount":1234,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg","keywords":["Atomic Stealer","Malvertising","Malware","Stealer Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-discovers-new-atomic-stealer-amos-mac-malware-variants\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/cryptocurrency-stealer-malware-blue-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-q7w","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100410"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100410"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100410\/revisions"}],"predecessor-version":[{"id":101357,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100410\/revisions\/101357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100417"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}