AMOS (Atomic macOS Stealer) Malware Targeting macOS Systems
The Atomic macOS Stealer (AMOS) is a prevalent malware-as-a-service targeting macOS, distributed via social engineering techniques like ClickFix ruses and fake installers, designed to steal sensitive data such as credentials and cryptocurrency wallets, leading to potential account compromise and further attacks.
The Atomic macOS Stealer (AMOS) is a malware-as-a-service (MaaS) that has become a significant threat to macOS systems. Sophos X-Ops reported that AMOS accounted for almost 40% of their macOS protection updates in 2025, more than double any other macOS malware family. It has been tracked since at least April 2023 and is distributed through social engineering techniques, including ClickFix ruses, fake installers, and lures related to AI models. AMOS is designed to steal Keychain data, browser credentials, cookies, autofill information, and other high-value artifacts like cryptocurrency wallet data, enabling rapid account takeover and follow-on attacks. Defenders have observed repeated password prompting until the victim provides their macOS password, which is then used to perform privileged actions.
Attack Chain
- The user is tricked into executing a command in the Terminal through social engineering (ClickFix).
- A first-stage bootstrap script is downloaded from
hxxps://sphereou[.]com/cleaneraand executed usingecho <b64> | base64 -d | bash. - The malware prompts the user for their macOS system password and validates it locally using
dscl . -authonly "$username" "$password", storing the password in a hidden file. - A second-stage payload is downloaded from
hxxps[://]sphereou[.]com/cleaner3/updateand saved to/tmp/update. Extended attributes are removed usingxattr -c /tmp/update, and the file is executed. - Anti-analysis routines check for virtualized environments (QEMU, VMware, KVM) by querying
system_profilerdata viaosascript. - The malware collects user and system data, including Keychain database, macOS password, Firefox and Chrome profile data, Apple Notes, extension storage, host and system profile data, and cryptocurrency-related information.
- Stolen data is archived and prepared for exfiltration to attacker infrastructure. Exfiltration targets include IP address 38[.]244[.]158[.]56.
- Persistence is established using LaunchDaemon. The system registers with a command-and-control (C2) server such as
hxxp://45[.]94[.]47[.]204/api/join/andhxxp://45[.]94[.]47[.]204/api/tasks/.
Impact
AMOS steals sensitive information like credentials, cookies, autofill data, and cryptocurrency wallet information. It can lead to account compromise, financial loss, and further attacks. Sophos reported that AMOS accounted for almost 40% of their macOS protection updates in 2025.
Recommendation
- Monitor process creations for execution of commands using
echo <b64> | base64 -d | bashvia the Sigma rule “Detect AMOS Stealer Bootstrap Execution”. - Monitor network connections to the C2 IP addresses
45[.]94[.]47[.]204and the data exfiltration IP address38[.]244[.]158[.]56at the firewall or proxy level. - Monitor file creation events for the creation of hidden password files under
/Users/$username/.passvia the Sigma rule “Detect AMOS Stealer Password File Creation”.
Detection coverage 3
Detect AMOS Stealer Bootstrap Execution
highDetects the execution of a bootstrap script commonly used by AMOS stealer using base64 decoding and bash execution.
Detect AMOS Stealer Password File Creation
highDetects the creation of a hidden password file by AMOS stealer under the user's home directory.
Detect AMOS Stealer Network Connection to C2
highDetects network connections to known AMOS command-and-control servers.
Detection queries are available on the platform. Get full rules →