Atomic macOS Stealer includes a backdoor for persistent access

Aug. 10, 2025, 9:47 p.m.

Description

The Atomic macOS Stealer (AMOS) has received a major update, now including an embedded backdoor for persistent access to compromised Mac devices. This upgrade allows attackers to maintain access, run remote tasks, and gain extended control over infected machines. The Russia-affiliated AMOS threat group has expanded its capabilities beyond data exfiltration, now enabling full system compromise. The malware's distribution vectors include websites offering cracked software and spear phishing campaigns targeting high-value individuals. The infection process involves a trojanized DMG file, bash scripts, and AppleScript for execution and persistence. The backdoor communicates with command-and-control servers, fetching and executing tasks on compromised systems. This evolution represents a significant escalation in both capability and intent, posing a higher risk to macOS users worldwide.

Date

  • Created: Aug. 8, 2025, 5:08 p.m.
  • Published: Aug. 8, 2025, 5:08 p.m.
  • Modified: Aug. 10, 2025, 9:47 p.m.

Indicators

  • f4976d9a90d2f9868fcaade1449ffcf9982ed2285ace90aafa7099ce246fd2ec
  • ec11fd865c2f502c47f100131f699a5e0589092e722a0820e96bd698364eefdb
  • 8d8b40e87d3011de5b33103df2ed4ec81458b2a2f8807fbb7ffdbc351c7c7b5e
  • 54b9576aad25d54d703adb9a26feaa5d80f44b94731ff8ecff7cf1ebc15cf3ff
  • 3402883ff6efadf0cc8b7434a0530fb769de5549b0e9510dfdd23bc0689670d6
  • 11e55fa23f0303ae949f1f1d7766b79faf0eb77bccb6f976f519a29fe51ce838

Attack Patterns

Additional Informations

  • Finance
  • Italy
  • Canada
  • France
  • United Kingdom of Great Britain and Northern Ireland
  • United States of America