Sunday, January 18, 2026

New Backdoor Unveiled in Atomic macOS Stealer, Allowing Remote Access Control

The notorious macOS Stealer (AMOS) has undergone a significant evolution, equipping itself with a new persistent backdoor that enables cybercriminals to achieve long-term, remote control over compromised Apple computers.

As detailed by Moonlock Lab, the security research arm of MacPaw, this move transforms AMOS from a conventional infostealer into a sustained national security threat, capable of executing commands and surveilling victims across over 120 countries, including the U.S., U.K., France, Italy, and Canada.

Persistent Backdoor Extends Threat Scope

Previously, AMOS was best known for stealing sensitive data like browser credentials and cryptocurrency wallets.

Now, its new backdoor escalates the threat by allowing attackers to maintain access across device reboots and silently execute commands or deploy further payloads.

Victims are primarily ensnared through spear-phishing, often tailored to cryptocurrency holders and freelancers such as artists, or via websites distributing pirated software.

Attackers masquerade as employers or service providers, convincing victims to install trojanized DMG files under the guise of job application processes that require screen sharing.

This social engineering trick typically involves requesting system passwords, unwittingly granting attackers deep privileges.

Technical Deep Dive: Evasion and Persistence

Once infiltrated, AMOS unleashes a two-pronged stealth mechanism on the victim’s system:

  • A hidden binary named .helper is stashed within the user’s home directory, remaining invisible to most users.
  • A wrapper script guarantees the continued execution of the malicious process.

To entrench itself at every startup, AMOS deploys a LaunchDaemon labeled com.finder.helper Through AppleScript, leveraging stolen credentials for system-level persistence.

This daemon ensures the malware survives system reboots, an unprecedented step up from past infostealers.

Further complicating detection, the malware communicates with command-and-control (C2) servers via obfuscated HTTP POST requests every 60 seconds, efficiently receiving remote tasks.

The code employs string obfuscation and runs checks for sandbox or virtual machine analysis with Apple’s system_profiler tool, heightening its evasion tactics.

Implications and the Road Ahead

AMOS’s architecture marks a pivotal shift in macOS threats, echoing attack strategies previously seen in North Korean cyber campaigns.

Security researchers, including those at PolySwarm, warn that the malware-as-a-service may soon incorporate keylogging and additional surveillance features.

AMOS’s Russian-speaking authors appear focused on long-haul system compromise, offering attackers a foothold for future operations and lateral movement within networks.

In response to AMOS’s relentless evolution, experts urge macOS users to adopt robust endpoint protections, avoid pirated software, and remain vigilant against phishing attempts.

As AMOS redefines the macOS threat landscape, heightened security awareness remains the first line of defense.

IOCs

8d8b40e87d3011de5b33103df2ed4ec81458b2a2f8807fbb7ffdbc351c7c7b5e

3402883ff6efadf0cc8b7434a0530fb769de5549b0e9510dfdd23bc0689670d6

f4976d9a90d2f9868fcaade1449ffcf9982ed2285ace90aafa7099ce246fd2ec

54b9576aad25d54d703adb9a26feaa5d80f44b94731ff8ecff7cf1ebc15cf3ff

11e55fa23f0303ae949f1f1d7766b79faf0eb77bccb6f976f519a29fe51ce838

ec11fd865c2f502c47f100131f699a5e0589092e722a0820e96bd698364eefdb

Recent News

Recent News