Threat Research Knowledge Base Threats Atomic Stealer (AMOS)
Atomic Stealer (AMOS)
Description
Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.
Variant Names
- Cuckoo
- Cthulu
- Poseidon
- Banshee
Alternative Names
- AMOS
- Atomic
Country of origin
- Russia
Symptoms
You might observe the following artifacts associated with this threat:
- Unexpected prompts for system permissions or passwords.
- Unfamiliar applications or processes.
- Unusual network activity or data usage.
Technical Breakdown
Atomic Stealer is typically distributed through websites hosting unsigned disk image (DMG) files that, when executed, install the malware on the victim's machine. The malware employs various obfuscation techniques to avoid detection, such as constantly changing its hash signatures while maintaining functionality. Additionally, Atomic Stealer uses XOR encoding to prevent detection.
Some of Atomic Stealer's capabilities include:
- Exfiltrating keychain passwords.
- Collecting system information.
- Stealing browser data and cookies.
- Accessing credit card information.
- Targeting cryptocurrency wallets.
Next Steps
Kandji Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect.
While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.
In the future, avoid downloading and installing software from torrent sources or untrusted websites. Ensure that all applications are obtained from official and reputable sources to maintain system integrity and security.
Learn more about it

How AMOS macOS Stealer Avoids Detection
Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.
Read moreRelated
Cthulhu is a macOS stealer that masquerades as legitimate software to deceive users into installing it. Once executed, it collects sensitive information, including system data, browser credentials, cryptocurrency wallets, and game account details. Cthulhu has also been known to target enterprise environments to conduct cyber espionage campaigns.
Cuckoo is an info stealer that typically masquerades as macOS applications such as Homebrew and Google Chrome. Discovered by Kandji in 2024, it has been known to steal passwords, as well as recording audio and video from an infected system.
Poseidon (RodrigoStealer) is an information stealer targeting macOS users, masquerading as legitimate applications such as the Arc browser. It is designed to exfiltrate sensitive data, including system information, browser credentials, cryptocurrency wallets, and documents. It has been associated with Russian-speaking cybercriminal communities and is actively distributed through phishing campaigns and compromised websites.
Manage and secure your Apple devices at scale.
