Skip to content

Threat Research Knowledge Base

Cthulhu

Description

Cthulhu is a macOS stealer that masquerades as legitimate software to deceive users into installing it. Once executed, it collects sensitive information, including system data, browser credentials, cryptocurrency wallets, and game account details. Cthulhu has also been known to target enterprise environments to conduct cyber espionage campaigns.

Get a Free Trial

Variant Names

N/A

Alternative Names

  • CleanMyMac
  • Grand Theft Auto IV

Country of origin

  • Russia

Symptoms

You might observe the following artifacts associated with this threat:

  • Unexpected prompts requesting system passwords.
  • Requests for crypto wallet passwords.
  • Creation of a directory at containing text files with stolen data.

Technical Breakdown

Cthulhu is often distributed as an Apple disk image (DMG). The malware is usually written in Go and masquerades as legitimate software, such as:

  • CleanMyMac
  • Grand Theft Auto IV (appears to be a typo for VI)
  • Adobe GenP

The malware then creates a directory storing the collected credentials in text files. Cthulhu then utilizes tools such as Chainbreak to dump Keychain data. An archive is then created containing the stolen data which Cthulhu then sends to its command-and-control server (C2).

Some of Cthulhu's capabilities include:

  • Stealing browser cookies.
  • Exfiltrating cryptocurrency wallets.
  • Accessing Telegram account information.
  • Collecting game account details, such as Minecraft and Battle.net data.
  • Dumping Keychain passwords.

Next Steps

Kandji Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect.

While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.

In the future, avoid downloading and installing software from torrent sources or untrusted websites. Ensure that all applications are obtained from official and reputable sources to maintain system integrity and security.

Related

Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.

Banshee is a sophisticated macOS infostealer that poses a significant threat to Apple users. It is designed to exfiltrate a wide range of sensitive information, including system data, login credentials, and, cryptocurrency wallets.

Cuckoo is an info stealer that typically masquerades as macOS applications such as Homebrew and Google Chrome. Discovered by Kandji in 2024, it has been known to steal passwords, as well as recording audio and video from an infected system.

Manage and secure your Apple devices at scale.

Laptop and 2 popup windows