Skip to content

Threat Research Knowledge Base

Atomic Stealer (AMOS)

Description

Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.

Get a Free Trial

Variant Names

  • Cuckoo
  • Cthulu
  • Poseidon
  • Banshee

Alternative Names

  • AMOS
  • Atomic

Country of origin

  • Russia

Symptoms

You might observe the following artifacts associated with this threat:

  • Unexpected prompts for system permissions or passwords.
  • Unfamiliar applications or processes.
  • Unusual network activity or data usage.

Technical Breakdown

Atomic Stealer is typically distributed through websites hosting unsigned disk image (DMG) files that, when executed, install the malware on the victim's machine. The malware employs various obfuscation techniques to avoid detection, such as constantly changing its hash signatures while maintaining functionality. Additionally, Atomic Stealer uses XOR encoding to prevent detection.

Some of Atomic Stealer's capabilities include:

  • Exfiltrating keychain passwords.
  • Collecting system information.
  • Stealing browser data and cookies.
  • Accessing credit card information.
  • Targeting cryptocurrency wallets.

Next Steps

Kandji Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect.

While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.

In the future, avoid downloading and installing software from torrent sources or untrusted websites. Ensure that all applications are obtained from official and reputable sources to maintain system integrity and security.

Learn more about it

How AMOS macOS Stealer Avoids Detection

How AMOS macOS Stealer Avoids Detection

Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.

Read more

Related

Cthulhu is a macOS stealer that masquerades as legitimate software to deceive users into installing it. Once executed, it collects sensitive information, including system data, browser credentials, cryptocurrency wallets, and game account details. Cthulhu has also been known to target enterprise environments to conduct cyber espionage campaigns.

Cuckoo is an info stealer that typically masquerades as macOS applications such as Homebrew and Google Chrome. Discovered by Kandji in 2024, it has been known to steal passwords, as well as recording audio and video from an infected system.

Poseidon (RodrigoStealer) is an information stealer targeting macOS users, masquerading as legitimate applications such as the Arc browser. It is designed to exfiltrate sensitive data, including system information, browser credentials, cryptocurrency wallets, and documents. It has been associated with Russian-speaking cybercriminal communities and is actively distributed through phishing campaigns and compromised websites.

Manage and secure your Apple devices at scale.

Laptop and 2 popup windows