{"id":99900,"date":"2024-02-29T03:32:33","date_gmt":"2024-02-29T11:32:33","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=99900"},"modified":"2024-08-08T18:54:08","modified_gmt":"2024-08-09T01:54:08","slug":"atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/","title":{"rendered":"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-97629\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-600x400-1.jpg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p>In <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-thieving-mac-malware-sold-via-telegram\/\">May<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-data-stealer-malware-roundup-atomicstealer-metastealer-realst-all-active-in-september\/\">September<\/a> 2023, we wrote about earlier variants of <strong>Atomic Stealer<\/strong>. This malware\u2014also known as Atomic macOS Stealer or AMOS for short\u2014is designed to exfiltrate sensitive data from infected Macs. It is distributed in the form of Trojan horses, such as pirated or &#8220;cracked&#8221; versions of apps.<\/p>\n<p>This week, reports have emerged of two different new variants of Atomic Stealer. Here&#8217;s everything you need to know about them and how to stay protected.<\/p>\n<h3>Atomic Stealer distributed through malicious Google Ads<\/h3>\n<p>One of the new Atomic Stealer variants, <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/one-year-later-rhadamanthys-is-still-dropped-via-malvertising\" target=\"_blank\" rel=\"noopener nofollow\">described<\/a> by J\u00e9r\u00f4me Segura, has been confirmed to be distributed in the wild via Google Ads poisoning. A threat actor paid Google for top placement, with sponsored ads that mimicked the real ads of the Notion productivity software. These ads appeared immediately above the actual search results; if you weren&#8217;t careful, you could have inadvertently visited a malware distribution site instead of landing on the real software developer&#8217;s site.<\/p>\n<p>If a victim clicked on a link in the malicious ad, they would be redirected to a fake Notion homepage which would offer Mac or Windows malware disguised as Notion software. The Windows malware was a stealer called Rhadamanthys, and the Mac malware was a new Atomic Stealer variant.<\/p>\n<div id=\"attachment_99906\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-99906\" loading=\"lazy\" class=\"size-full wp-image-99906\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/02\/Atomic-Stealer-Trojan-horse-disguised-as-Notion.jpg\" alt=\"\" width=\"600\" height=\"450\" \/><p id=\"caption-attachment-99906\" class=\"wp-caption-text\">An OSX\/AtomicStealer Trojan horse, masquerading as Notion productivity software.<\/p><\/div>\n<p>Notably, this Atomic Stealer variant has very low detection on the multi-engine single file scanning site VirusTotal; only 6 out of 60 engines detect it, while other variants (like the ones described below) typically have at least 20 detections.<\/p>\n<h3>A second variant disguised as a &#8220;Crack Installer&#8221;<\/h3>\n<p>Another variant, <a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/when-stealers-converge-new-variant-of-atomic-stealer-in-the-wild\/\" target=\"_blank\" rel=\"noopener nofollow\">described<\/a> by Andrei Lapusneanu, disguises itself as an unspecified &#8220;Crack Installer.&#8221; If a victim follows the directions from the disk image, and does a &#8220;right click&#8221; and clicks Open, a Mach-O app runs. Like with the first variant, this app is a dropper, meaning it will attempt to download and execute a further stage of the malware.<\/p>\n<div id=\"attachment_99907\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-99907\" loading=\"lazy\" class=\"size-full wp-image-99907\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/02\/Atomic-Stealer-Trojan-horse-disguised-as-Crack-Installer.jpg\" alt=\"\" width=\"600\" height=\"317\" \/><p id=\"caption-attachment-99907\" class=\"wp-caption-text\">Another OSX\/AtomicStealer Trojan, disguised as a &#8220;Crack Installer&#8221;<\/p><\/div>\n<p>The next stage is a Python script that does all the usual things one expects stealer malware to do; it attempts to gather and exfiltrate browser data such as saved passwords, cookies, autofill text, and cryptocurrency wallets. It uses AppleScript code similar to that used in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/itunes-imessage-and-vision-pro-intego-mac-podcast-episode-331\/#:~:text=What%20is%20RustDoor%20malware%3F\">RustDoor malware<\/a> seen earlier in February. This Atomic Stealer variant attempts to send the stolen data to an IP address that has previously been linked to Windows malware called Amadey.<a name=\"staysafe\"><\/a><\/p>\n<h3>How can I keep my Mac safe from malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re protected from this malware. Intego detects these samples as <strong>OSX\/Stealer.ext<\/strong>, <strong>virus\/OSX\/Agent.mysf<\/strong>, <strong>virus\/OSX\/AVA.Agent.amos<\/strong>, <strong>virus\/OSX\/AVF.Agent.tfcg<\/strong>, <strong>virus\/OSX\/AVI.Agent.dkaa<\/strong>, and similar names.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional technical details and indicators of compromise (IOCs) for these Atomic Stealer variants, you can read <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/one-year-later-rhadamanthys-is-still-dropped-via-malvertising\" target=\"_blank\" rel=\"noopener nofollow\">J\u00e9r\u00f4me Segura&#8217;s write-up<\/a> and <a href=\"https:\/\/infosec.exchange\/@jeromesegura\/112010195323757219\" target=\"_blank\" rel=\"noopener\">social media post<\/a>, and <a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/when-stealers-converge-new-variant-of-atomic-stealer-in-the-wild\/\" target=\"_blank\" rel=\"noopener nofollow\">Andrei Lapusneanu&#8217;s write-up<\/a>.<\/p>\n<p>We discussed the resurgence of Atomic Stealer\u2014as well as Google&#8217;s concerning ineptitude at preventing overt copycat ads that link to malware sites\u2014on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/stealer-malware-app-store-scams-and-the-demise-of-the-apple-car-intego-mac-podcast-episode-333\">episode 333<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+rwjV_DUs?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Be sure to also check out our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-mac-and-iphone-malware-of-2023-and-what-to-expect-in-2024\/#forecast\">2024 Apple malware forecast<\/a> and our previous <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\">Mac malware articles<\/a> from 2024 and earlier.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.<\/p>\n","protected":false},"author":14,"featured_media":97628,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4737,4615,86,4722],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-29T11:32:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T01:54:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"MacStealer graphic for cryptocurrency wallet stealing or cryptojacking mining malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\",\"name\":\"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#primaryimage\"},\"datePublished\":\"2024-02-29T11:32:33+00:00\",\"dateModified\":\"2024-08-09T01:54:08+00:00\",\"description\":\"The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads\",\"datePublished\":\"2024-02-29T11:32:33+00:00\",\"dateModified\":\"2024-08-09T01:54:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#webpage\"},\"wordCount\":751,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg\",\"keywords\":[\"Atomic Stealer\",\"Malvertising\",\"Malware\",\"Stealer Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/","og_locale":"en_US","og_type":"article","og_title":"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads - The Mac Security Blog","og_description":"The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-02-29T11:32:33+00:00","article_modified_time":"2024-08-09T01:54:08+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg","width":400,"height":260,"caption":"MacStealer graphic for cryptocurrency wallet stealing or cryptojacking mining malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/","name":"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#primaryimage"},"datePublished":"2024-02-29T11:32:33+00:00","dateModified":"2024-08-09T01:54:08+00:00","description":"The Mac malware family known as Atomic Stealer or AMOS has resurfaced, and it is being distributed through multiple campaigns. Here are the latest details on how to stay protected.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Atomic Stealer (AMOS) Mac malware spreads via malicious Google Ads","datePublished":"2024-02-29T11:32:33+00:00","dateModified":"2024-08-09T01:54:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#webpage"},"wordCount":751,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg","keywords":["Atomic Stealer","Malvertising","Malware","Stealer Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/04\/cryptocurrency-stealing-cryptojacking-mining-malware-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pZi","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99900"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=99900"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99900\/revisions"}],"predecessor-version":[{"id":99962,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99900\/revisions\/99962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97628"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=99900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=99900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=99900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}