<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Trezor Suite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/trezor-suite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 11:40:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/trezor-suite/feed.xml" rel="self" type="application/rss+xml"/><item><title>AMOS (Atomic macOS Stealer) Malware Targeting macOS Systems</title><link>https://feed.craftedsignal.io/briefs/2026-05-amos-stealer/</link><pubDate>Thu, 14 May 2026 11:40:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-amos-stealer/</guid><description>The Atomic macOS Stealer (AMOS) is a prevalent malware-as-a-service targeting macOS, distributed via social engineering techniques like ClickFix ruses and fake installers, designed to steal sensitive data such as credentials and cryptocurrency wallets, leading to potential account compromise and further attacks.</description><content:encoded><![CDATA[<p>The Atomic macOS Stealer (AMOS) is a malware-as-a-service (MaaS) that has become a significant threat to macOS systems. Sophos X-Ops reported that AMOS accounted for almost 40% of their macOS protection updates in 2025, more than double any other macOS malware family. It has been tracked since at least April 2023 and is distributed through social engineering techniques, including ClickFix ruses, fake installers, and lures related to AI models. AMOS is designed to steal Keychain data, browser credentials, cookies, autofill information, and other high-value artifacts like cryptocurrency wallet data, enabling rapid account takeover and follow-on attacks. Defenders have observed repeated password prompting until the victim provides their macOS password, which is then used to perform privileged actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user is tricked into executing a command in the Terminal through social engineering (ClickFix).</li>
<li>A first-stage bootstrap script is downloaded from <code>hxxps://sphereou[.]com/cleanera</code> and executed using <code>echo &lt;b64&gt; | base64 -d | bash</code>.</li>
<li>The malware prompts the user for their macOS system password and validates it locally using <code>dscl . -authonly &quot;$username&quot; &quot;$password&quot;</code>, storing the password in a hidden file.</li>
<li>A second-stage payload is downloaded from <code>hxxps[://]sphereou[.]com/cleaner3/update</code> and saved to <code>/tmp/update</code>. Extended attributes are removed using <code>xattr -c /tmp/update</code>, and the file is executed.</li>
<li>Anti-analysis routines check for virtualized environments (QEMU, VMware, KVM) by querying <code>system_profiler</code> data via <code>osascript</code>.</li>
<li>The malware collects user and system data, including Keychain database, macOS password, Firefox and Chrome profile data, Apple Notes, extension storage, host and system profile data, and cryptocurrency-related information.</li>
<li>Stolen data is archived and prepared for exfiltration to attacker infrastructure. Exfiltration targets include IP address 38[.]244[.]158[.]56.</li>
<li>Persistence is established using LaunchDaemon. The system registers with a command-and-control (C2) server such as <code>hxxp://45[.]94[.]47[.]204/api/join/</code> and <code>hxxp://45[.]94[.]47[.]204/api/tasks/</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>AMOS steals sensitive information like credentials, cookies, autofill data, and cryptocurrency wallet information. It can lead to account compromise, financial loss, and further attacks. Sophos reported that AMOS accounted for almost 40% of their macOS protection updates in 2025.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for execution of commands using <code>echo &lt;b64&gt; | base64 -d | bash</code> via the Sigma rule &ldquo;Detect AMOS Stealer Bootstrap Execution&rdquo;.</li>
<li>Monitor network connections to the C2 IP addresses <code>45[.]94[.]47[.]204</code> and the data exfiltration IP address <code>38[.]244[.]158[.]56</code> at the firewall or proxy level.</li>
<li>Monitor file creation events for the creation of hidden password files under <code>/Users/$username/.pass</code> via the Sigma rule &ldquo;Detect AMOS Stealer Password File Creation&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>macos</category><category>amos</category><category>infostealer</category></item></channel></rss>