{"id":97905,"date":"2023-05-04T19:49:08","date_gmt":"2023-05-05T02:49:08","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=97905"},"modified":"2024-05-16T09:58:46","modified_gmt":"2024-05-16T16:58:46","slug":"atomic-stealer-thieving-mac-malware-sold-via-telegram","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/","title":{"rendered":"Atomic Stealer: Thieving Mac malware sold via Telegram"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97908\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-600x400-1.jpg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p>A threat actor is offering \u201cmalware as a service\u201d that can steal sensitive data from Macs. Dubbed AtomicStealer\u2014or Atomic macOS Stealer, AMOS\u2014the framework enables cybercriminals to create custom Trojan horse malware. These Trojans attempt to exfiltrate passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.<\/p>\n<p>Below, we&#8217;ll explain what you need to know about this new Mac threat and how to stay protected.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#whatdo\">What does OSX\/AtomicStealer Mac malware do?<\/a><\/li>\n<li><a href=\"#how-to-remove\">How can one remove or prevent AtomicStealer and other Mac malware?<\/a><\/li>\n<li><a href=\"#whodunit\">Who created the AtomicStealer malware framework?<\/a><\/li>\n<li><a href=\"#iocs\">AtomicStealer indicators of compromise (IoCs)<\/a><\/li>\n<li><a href=\"#other-names\">Is AtomicStealer known by any other names?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"whatdo\"><\/a><\/li>\n<\/ul>\n<h3>What does OSX\/AtomicStealer Mac malware do?<\/h3>\n<p>A threat actor has recently begun selling access to a new, customizable Mac data-stealing malware framework. Access to the framework is advertised via the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\">Telegram secure messaging app<\/a>.<\/p>\n<p>Reportedly, other cybercriminals can &#8220;lease&#8221; the malware framework at $1,000 per month. This implicitly means that the original developer may continue to update the framework to try to evade antivirus detection as part of this &#8220;malware as a service&#8221; operation.<\/p>\n<p>So what can AtomicStealer-based malware do? We can easily observe that the malware attempts to trick users into divulging their administrator password via a fake system prompt, generated with AppleScript code.<\/p>\n<div id=\"attachment_97935\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-97935\" loading=\"lazy\" class=\"size-full wp-image-97935\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/AtomicStealer-Mac-malware-AppleScript-fake-admin-password-prompt-dialog-box.png\" alt=\"\" width=\"600\" height=\"383\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/AtomicStealer-Mac-malware-AppleScript-fake-admin-password-prompt-dialog-box.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/AtomicStealer-Mac-malware-AppleScript-fake-admin-password-prompt-dialog-box-300x192.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/AtomicStealer-Mac-malware-AppleScript-fake-admin-password-prompt-dialog-box-150x96.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-97935\" class=\"wp-caption-text\">AtomicStealer&#8217;s first variant attempts to trick users into giving up their admin password via a fake system dialog box.<\/p><\/div>\n<p>If users type their password into this dialog box, it is then logged insecurely on the system\u2014in plain text.<\/p>\n<p>According to the seller, the malware can do a number of other things, but the primary goal appears to be exfiltration of valuable digital assets.<\/p>\n<p>The malware will supposedly try to export all passwords from the Keychain, steal saved passwords and stay-logged-in session cookies from all popular browsers, and steal cryptocurrency from more than 50 varieties of wallets.<\/p>\n<p>After obtaining a victim&#8217;s passwords and session cookies, an attacker may be able to pivot to breaking into other accounts belonging to the victim. As we <a href=\"https:\/\/www.intego.com\/mac-security-blog\/macstealer-mac-trojan-malware-steals-passwords-wallets-and-files\/#why-cookies\">mentioned recently in our coverage of MacStealer malware<\/a>, stealing stay-logged-in cookies often allows attackers to bypass two-factor authentication.<a name=\"how-to-remove\"><\/a><\/p>\n<h3>How can one remove or prevent AtomicStealer and other Mac malware?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/p>\n<p>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate this Mac malware. Intego products detect components of this threat as <strong>OSX\/Downloader.go<\/strong>, or variations of <strong>virus\/OSX\/Agent<\/strong>.<\/p>\n<p>If you believe your Mac may be infected\u2014or to prevent future infections\u2014use trusted antivirus software. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It&#8217;s compatible with a variety of Mac hardware and OS versions, including the latest Apple silicon Macs running macOS Ventura.<\/p>\n<p>Additionally, if you use a Windows PC, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from PC malware.<\/p>\n<p><span style=\"font-size: small;\">VirusBarrier X6, X7, and X8 on older Mac OS X versions also provide protection. Note, however, that it is best to upgrade to the latest versions of macOS and VirusBarrier; this will help ensure your Mac gets all the latest security updates from Apple.<a name=\"whodunit\"><\/a><\/span><\/p>\n<h3>Who created the AtomicStealer malware framework?<\/h3>\n<p>The first researcher to write about AtomicStealer&#8217;s initial variant <a href=\"https:\/\/twitter.com\/phd_phuc\/status\/1651002681798926337\" target=\"_blank\" rel=\"noopener\">noted<\/a> something interesting: evidently, the username on the developer&#8217;s computer was <code>iluhaboltov<\/code>. Although this does not provide definitive evidence of the malware author&#8217;s name, it&#8217;s noteworthy that the developer began using an account with the generic username <code>administrator<\/code> for subsequent variants of AtomicStealer.<\/p>\n<p>Boltov is a surname that is most common in Russia and Ukraine; it means &#8220;bolts&#8221; in Russian.<\/p>\n<p>Iluha isn&#8217;t a particularly common given name, but it can be a masculine East Slavic name, a variant of Elijah. Iluha can also mean to weep or to tear up in Filipino or Tagalog. Iluh can be a Balinese name for a first-born female. Luha can be an Islamic feminine name meaning measure or amount.<\/p>\n<p>If the developer truly did reveal their own name, it wouldn&#8217;t be the first time that a cybercriminal has made such an opsec failure. In 2019, Intego published a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/07\/Intego-Mac-Malware-Attribution-White-Paper-20190601.pdf\" target=\"_blank\" rel=\"noopener\">white paper (PDF) about Mac malware attribution<\/a> in which I wrote about several malware makers who had unintentionally exposed their real names by mistake.<a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" name=\"iocs\"><\/a><\/p>\n<h3>AtomicStealer indicators of compromise (IoCs)<\/h3>\n<p>The following SHA-256 hashes relate to AtomicStealer malware campaigns:<\/p>\n<pre>0498d08c1bc471fa4c4ebd1242bfaeabd79c4e1a8133205274a6e2c08c7cb581**\r\n1062073ce5aad5bc8f05bd6b47898d5c11ace4a32cb1234e0c9c4f5aa27a6d17\r\n15f39e53a2b4fa01f2c39ad29c7fe4c2fef6f24eff6fa46b8e77add58e7ac709\r\n18d09f30c600855411488e670ef8413c3dc7f9f326b697c9815ba2a5baa55c0f\r\n20a7971970dc0e0e02859f9c51a0626455a146919b8dc9c9c8172bd18988e8df*\r\n2175cc3bc1e3bf4cc27a9524b34d47c14b9aa094061600c0c4bfee9447bd54b4\r\n262f6dc6862c0377034d50c007386860d7a3ca3da95b6ecc2dfa53057b5924fa*\r\n26b304352f45fd551195a66b7fbf493122cbc1442d6ef2aea73d75458c19bc56\r\n2b4a06a50ff151f38586f1f3ae97990efb69dba80bfd4521a50ccdeeb4cf2b5b\r\n2c63ba2b1a5131b80e567b7a1a93997a2de07ea20d0a8f5149701c67b832c097\r\n2d0dda75bfc90e7ffda72640eb32c7ff9f51c90c30f4a6d1e05df93e58848f36\r\n3a14c28ec0bd616b029efa6b1421a120869c80f088add868de93aeefd1b60cbc**\r\n3dcb157b5a16f76e60f0407f7036692d04c2dfbbf334c2b843ec77a9b2f930fe*\r\n4594513f34af968cf3fba5cd50331bbe7329ce436898eedecf53e574f6e05dcc\r\n4cc591bf6dbfe851cc8fd891d8a5f3c2723dcad14e12f81eb58c008267ab8489\r\n4d9a01b8f1efd30d39d7f6af61f2723f593436fdd667669b15d149db6eac04b0\r\n51a0b39dc222749788e6559d5068b3633366b1a03690ac16e29f1ba9ed2f87ff\r\n56cd21cb9f114e7e1709592449ab7cce2bb3a2a7c89dab72f9be88a99fc9e775\r\n6152e233795fa52b5ee2c0283636c76d6389c9dfad5413408ea26fd7aa42fa23\r\n71bcccde296cea2da9ad9ff294c672123e782abb3369d0576c3456391d4bb13e**\r\n73ec6b3ec30b5437c910d04057e721a94525dcab00c283cac5a8cef8a28b2cae*\r\n77589a321b3b876d4179cd4d287e6111b00edbfaeb50e5c2e729bf10a7ac005c\r\n7e481f05173d895c2aa50fa5625a48877af2284da53285a71cc9845674004239\r\n7fe19d8f93feafbbc23a1640534e9de2f5d6c88411bb23f622dabe5038026426*\r\n821b05cef55eca9e07697c02b837567a75c9adc2e82afb798a41b4e6c0ae2ee9\r\n82d2c1cdf97bbbb537879be0f3a50f28aa74ce353c6c4f4df736eae7751675b7\r\n972c60772190eaf6a7d4fd15a342bcb947d49e39e996ddc899ff77eb31f113aa\r\n990aaf49f24274dbecb68929683b1baa5ed1621722bed774ee8694b541b785e3\r\n9d34698409f4a140822cd2e83c0f0c109436e8028a7e15f3e4428b41a86fa168**\r\na00f4722b3922a61febd6db22c3cacfb75f3fcfe9f4e1a372e3c6d7d4ee94947\r\na2fec3172d70f7515d43959264a0ee55433ca8207b7022dc1f6430a1616d9a64\r\na4d590b7b0b5b1d7971b6f24a210afaa6024ac6b1ac13bbbb668739a230acc8f\r\na856dccf60644f8e95461f5eb1f20fd688a72ce778625d775455e73cbe2648d3\r\nae24165de234f584dc53ab941e22e9f479d02baf6cdd6f120c84f7e8ebb5aca5**\r\nc294c28ef8f07bc30c9fe1980bd83236ae52fbdcb596117aa675ebe28a7ea548\r\nc4078213cf64a68c5f0fc77d65e16d989d817c09814a01f73e37099c4ed6e0a7**\r\nc65a90e559db80612209717337a86bd072beb0125af126772873a4a6da50bf96\r\nc76f71a617937866b5ccef9f10658cabc81c400f50971e04455c07a8d08da5b6**\r\nd9e46d316a975ec70827916976988fcff582e42f3927e0e158a9cd89c15a0b6e*\r\ne06a094d0bec6020536cdb92f0bd2171e48ca36b3f34b8ffd6da7f52f78436ec\r\ne2a756710241d90fd5d2c3fb33bf787014e1f5b4b6b516b6afd8fcb7cbd0ccbf\r\ne3d703fee5b08f5c869f34d79d08b8b9438b261a737c8b1275655f403b0b39e2\r\ne6b6cf40d605fc7a5e8ba168a8a5d8699b0879e965d2b803e29b87926cba861f\r\nea2235ea26951276cf724430774e1817295e53e64c55ababac38ec5443f066f6**\r\nf8cd5ff37ef71afe16b4499d9e0f7b92a7759e3cacb0fbbdc78bec39842c99a1\r\nff23a27fd326d428e931a42fa08d9e0c17f16c9cd7a1afbaba16ab4ae80a6656**\r\nff4ce9dfe2ced97df1deeeda3e2450e958bd4bcad3778bad2bed080619014f46\r\n* First reported by Intego\r\n**First reported by Intego; added 8 May 2023<\/pre>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Looks like a new variant of the \u201cAtomic macOS Stealer\u201d malware dropped just in time for Cinco de Mayo. Very low detection rates on <a href=\"https:\/\/twitter.com\/virustotal?ref_src=twsrc%5Etfw\">@VirusTotal<\/a>.<\/p>\n<p>All of these new samples were uploaded in the US via VT API keys, IDs af632c50 or 97e2a062. <a href=\"https:\/\/twitter.com\/hashtag\/AtomicStealer?src=hash&amp;ref_src=twsrc%5Etfw\">#AtomicStealer<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/AMOS?src=hash&amp;ref_src=twsrc%5Etfw\">#AMOS<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/OSX?src=hash&amp;ref_src=twsrc%5Etfw\">#OSX<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\">#malware<\/a> <a href=\"https:\/\/t.co\/WFSU1FykHW\">pic.twitter.com\/WFSU1FykHW<\/a><\/p>\n<p>&mdash; Josh Long (the\u00a0JoshMeister) (@theJoshMeister) <a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/1654737222749544448?ref_src=twsrc%5Etfw\">May 6, 2023<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>These command-and-control (C&amp;C) domains and IP address have been used in conjunction with this malware:<\/p>\n<pre>amos-malware[.]ru\r\n37.220.87[.]16<\/pre>\n<p>Network administrators can check recent network traffic logs to try to identify whether any computers on their network may have attempted to contact this domain or IP address, which could indicate a possible infection.<a name=\"other-names\"><\/a><\/p>\n<h3>Is AtomicStealer known by any other names?<\/h3>\n<p>Other vendors&#8217; names for threat components related to this malware campaign may include variations of the following, among others:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of OSX\/PSW.Agent.J, Backdoor (0040f37c1), DMG\/MAC\/Agent.C, Gen:Variant.Trojan.MAC.Stealer.3, HEUR:Trojan-PSW.OSX.Amos.a, HEUR:Trojan-PSW.OSX.Amos.gen, IOS\/Agent.T, Mac.Stealer.5, MacOS:Agent-YR [Trj], MacOS:AMOS-A [Trj], MacOS\/Agent.T, Malware.OSX\/Agent.aastz [or apvnq, bikjo, dplus, fqgok, hefho, hpdme, igrcu, jdnso, jinac, kgzuf, mewoo, miqkw, nqwim, nyoag, ownpu, pvour, snanh, tkpml, uzzyb, wojiq, xvddr, xveph, ylarv, ylask, zaxaz], Osx.Trojan-QQPass.QQRob.Azlw [or Eflw, Gajl, Itgl, Kflw, Qgil], OSX.Trojan.Agent.240XS0 [or Azlw, B01BNO, Bujl, Cgow, Ctgl, Dtgl, Gajl, Gjgl, Hkjl, Itgl, Jkjl, Ljgl, Lqil, Msmw, Ojgl, ORDPIH, Pqil, Psmw, Qcnw, Twhl, VZCCLC], OSX.Trojan.Gen, OSX.Trojan.Gen.2, OSX\/Agent.2308!tr [or aastz, apvnq, bikjo, dplus, fqgok, hefho, hpdme, igrcu, J!tr.pws, jdnso, jinac, kgzuf, mewoo, miqkw, nqwim, nyoag, ownpu, pvour, snanh, tkpml, uzzyb, wojiq, xvddr, xveph, ylarv, ylask, zaxaz], OSX\/InfoStl-CP, OSX\/MacStealer.d, OSX\/PSW.Agent.J, Other:Malware-gen [Trj], TROJ_FRS.0NA104DT23, Trojan-Spy.MAC.Atomic, Trojan:MacOS\/Amos!MTB, Trojan:MacOS\/Amos.A!MTB, Trojan:MacOS\/AtomicSteal.A, Trojan:MacOS\/Multiverze, Trojan:Win32\/Vigorf.A, Trojan.MAC.Generic.112364 [or 112365, 112381, 112636, 112639, D1B6EC, D1B6FD, D1B7FC], Trojan.MacOS.S.Stealer.54058210, Trojan.MacOS.S.Stealer.54058274.A, Trojan.OSX.Agent, Trojan.OSX.Amos.4!c, Trojan.OSX.Generic.4!c, Trojan.Trojan.MAC.Stealer.3, Trojan\/OSX.Agent.47995673 [or 54058210, 54058274], TrojanPSW:MacOS\/MacStealer.da728306, UDS:DangerousObject.Multi.Generic, UDS:Trojan-PSW.OSX.Amos.gen<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional technical details about this malware, see <a href=\"https:\/\/twitter.com\/phd_phuc\/status\/1651001139750420480\" target=\"_blank\" rel=\"noopener\">PhD. Phuc&#8217;s tweet thread<\/a> that first brought it to light, <a href=\"https:\/\/blog.cyble.com\/2023\/04\/26\/threat-actor-selling-new-atomic-macos-amos-stealer-on-telegram\/\" target=\"_blank\" rel=\"noopener nofollow\">Cyble&#8217;s technical write-up<\/a>, and <a href=\"https:\/\/www.sentinelone.com\/blog\/atomic-stealer-threat-actor-spawns-second-variant-of-macos-malware-sold-on-telegram\/\" target=\"_blank\" rel=\"noopener nofollow\">Phil Stokes&#8217; technical write-up of another variant<\/a>.<\/p>\n<p>We also acknowledge <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1651496976486154240\" target=\"_blank\" rel=\"noopener\">MalwareHunterTeam<\/a> and <a href=\"https:\/\/twitter.com\/dustyfresh\/status\/1652051641506340867\" target=\"_blank\" rel=\"noopener\">dustyfresh<\/a> for their tweets with additional observations, which correlated with some of Intego&#8217;s research team&#8217;s findings.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes. You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atomic Stealer, a new \u201cmalware as a service\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.<\/p>\n","protected":false},"author":14,"featured_media":97907,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4737,41,3985,86,4722,3364],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Atomic Stealer, a new \u201cmalware as a service\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atomic Stealer: Thieving Mac malware sold via Telegram - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Atomic Stealer, a new \u201cmalware as a service\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-05T02:49:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T16:58:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Cryptocurrency, cookie, password credential stealing macOS malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\",\"name\":\"Atomic Stealer: Thieving Mac malware sold via Telegram - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#primaryimage\"},\"datePublished\":\"2023-05-05T02:49:08+00:00\",\"dateModified\":\"2024-05-16T16:58:46+00:00\",\"description\":\"Atomic Stealer, a new \\u201cmalware as a service\\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atomic Stealer: Thieving Mac malware sold via Telegram\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Atomic Stealer: Thieving Mac malware sold via Telegram\",\"datePublished\":\"2023-05-05T02:49:08+00:00\",\"dateModified\":\"2024-05-16T16:58:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#webpage\"},\"wordCount\":1189,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg\",\"keywords\":[\"Atomic Stealer\",\"Cookies\",\"Cryptocurrency\",\"Malware\",\"Stealer Malware\",\"Telegram Messenger\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Atomic Stealer, a new \u201cmalware as a service\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/","og_locale":"en_US","og_type":"article","og_title":"Atomic Stealer: Thieving Mac malware sold via Telegram - The Mac Security Blog","og_description":"Atomic Stealer, a new \u201cmalware as a service\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-05-05T02:49:08+00:00","article_modified_time":"2024-05-16T16:58:46+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg","width":400,"height":260,"caption":"Cryptocurrency, cookie, password credential stealing macOS malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/","name":"Atomic Stealer: Thieving Mac malware sold via Telegram - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#primaryimage"},"datePublished":"2023-05-05T02:49:08+00:00","dateModified":"2024-05-16T16:58:46+00:00","description":"Atomic Stealer, a new \u201cmalware as a service\u201d framework, can exfiltrate sensitive data from Macs, including passwords, stay-logged-in session cookies, cryptocurrency wallets, and more.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Atomic Stealer: Thieving Mac malware sold via Telegram"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Atomic Stealer: Thieving Mac malware sold via Telegram","datePublished":"2023-05-05T02:49:08+00:00","dateModified":"2024-05-16T16:58:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#webpage"},"wordCount":1189,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg","keywords":["Atomic Stealer","Cookies","Cryptocurrency","Malware","Stealer Malware","Telegram Messenger"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/cryptocurrency-and-cookie-stealing-malware-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pt7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97905"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=97905"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97905\/revisions"}],"predecessor-version":[{"id":98901,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97905\/revisions\/98901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97907"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=97905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=97905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=97905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}