This time Match new malware targeting its users Atomic macOS Stealer is on the agenda. Be wary of the pest that can steal a lot of data need.
Malware, of course, only windows It is not prepared for the operating system. Different malware options continue to come up for Apple-signed computer models with macOS operating system. The newest of these Atomic macOS Stealer, As it turns out, it is sold by a person via Telegram with a monthly usage fee of $ 1,000. Sent to systems as a DMG file which, if installed, asks people for the system password on the basis of a fake window atomic, if this password is given, it will save iCloud Keychain passwords in the system, cookies from Chrome, Firefox, Brave, Edge, Opera and more, passwords (They can take over all pages with automatic login) and can steal credit card information. Atomic, which is very dangerous, can also endanger crypto wallets such as Binance, Exodus, Electrum and MetaMask. In order to protect from these and similar pests, It is not necessary to install applications on Mac computers from outside the App Store or from any truly unknown source.. You should also keep systems up-to-date, not grant unnecessary access to applications, and avoid suspicious links sent via email.
YOU MAY BE INTERESTED
Similarly, if it has been discussed before MacStealer had happened. MacStealer, which focuses directly on information theft, iCloud KeyChain (Apple’s built-in password manager) It can steal credentials stored in web browsers, especially password / login information, crypto wallets and some other sensitive files. Capable of collecting passwords, cookies and credit card data saved in Firefox, Google Chrome and Brave browsers MacStealerreportedly can run on macOS Catalina and higher operating systems, on Mac computer models with Intel or M-Series processors stealing silently.
Especially now “Weed.dmg” application file, when this “dmg” file is opened, it opens a false password prompt that seems to come from the system. When you enter the system password here, all the data that can be obtained from the computer are gathered together, they are made into a .zip file and transmitted over the internet. Automatically deletes stolen and bundled data to hide its tracks MacStealer, It raises concerns that it may be in distribution in other ways as well.