The notorious macOS Stealer (AMOS) has undergone a significant evolution, equipping itself with a new persistent backdoor that enables cybercriminals to achieve long-term, remote control over compromised Apple computers.
As detailed by Moonlock Lab, the security research arm of MacPaw, this move transforms AMOS from a conventional infostealer into a sustained national security threat, capable of executing commands and surveilling victims across over 120 countries, including the U.S., U.K., France, Italy, and Canada.
Previously, AMOS was best known for stealing sensitive data like browser credentials and cryptocurrency wallets.
Now, its new backdoor escalates the threat by allowing attackers to maintain access across device reboots and silently execute commands or deploy further payloads.
Victims are primarily ensnared through spear-phishing, often tailored to cryptocurrency holders and freelancers such as artists, or via websites distributing pirated software.
Attackers masquerade as employers or service providers, convincing victims to install trojanized DMG files under the guise of job application processes that require screen sharing.
This social engineering trick typically involves requesting system passwords, unwittingly granting attackers deep privileges.
Once infiltrated, AMOS unleashes a two-pronged stealth mechanism on the victim’s system:
.helper is stashed within the user’s home directory, remaining invisible to most users.To entrench itself at every startup, AMOS deploys a LaunchDaemon labeled com.finder.helper Through AppleScript, leveraging stolen credentials for system-level persistence.
This daemon ensures the malware survives system reboots, an unprecedented step up from past infostealers.
Further complicating detection, the malware communicates with command-and-control (C2) servers via obfuscated HTTP POST requests every 60 seconds, efficiently receiving remote tasks.
The code employs string obfuscation and runs checks for sandbox or virtual machine analysis with Apple’s system_profiler tool, heightening its evasion tactics.
AMOS’s architecture marks a pivotal shift in macOS threats, echoing attack strategies previously seen in North Korean cyber campaigns.
Security researchers, including those at PolySwarm, warn that the malware-as-a-service may soon incorporate keylogging and additional surveillance features.
AMOS’s Russian-speaking authors appear focused on long-haul system compromise, offering attackers a foothold for future operations and lateral movement within networks.
In response to AMOS’s relentless evolution, experts urge macOS users to adopt robust endpoint protections, avoid pirated software, and remain vigilant against phishing attempts.
As AMOS redefines the macOS threat landscape, heightened security awareness remains the first line of defense.
8d8b40e87d3011de5b33103df2ed4ec81458b2a2f8807fbb7ffdbc351c7c7b5e
3402883ff6efadf0cc8b7434a0530fb769de5549b0e9510dfdd23bc0689670d6
f4976d9a90d2f9868fcaade1449ffcf9982ed2285ace90aafa7099ce246fd2ec
54b9576aad25d54d703adb9a26feaa5d80f44b94731ff8ecff7cf1ebc15cf3ff
11e55fa23f0303ae949f1f1d7766b79faf0eb77bccb6f976f519a29fe51ce838
ec11fd865c2f502c47f100131f699a5e0589092e722a0820e96bd698364eefdb
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…