{"id":39218,"date":"2023-04-28T14:05:53","date_gmt":"2023-04-28T18:05:53","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=39218"},"modified":"2023-05-01T09:19:05","modified_gmt":"2023-05-01T13:19:05","slug":"macstealer-malware","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2023\/04\/28\/macstealer-malware\/","title":{"rendered":"MacStealer Malware"},"content":{"rendered":"<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/new-macos-malware-yoinks-a-trove-of-sensitive-information-including-a-users-entire-keychain-database\">Jovi Umawing<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=35581375\">Hacker News<\/a>, <a href=\"https:\/\/www.macrumors.com\/2023\/04\/28\/atomic-macos-stealer-malware\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/new-macos-malware-yoinks-a-trove-of-sensitive-information-including-a-users-entire-keychain-database\"><p>Users are manipulated to download and execute this file onto their systems. Once achieved, a bogus password prompts users in an attempt to steal their real password. MacStealer then saves the password in the affected system&rsquo;s temporary folder (TMP).<\/p><p>The malware then proceeds to collect and save the following also within the TMP folder:<\/p><ul><li>Account passwords, browser cookies, and stored credit card details in Firefox, Chrome, and Brave<\/li><li>Cryptocurrency wallets (Binance, Coinomi, Exodus, Keplr Wallet, Martian Wallet, MetaMask, Phantom, Tron, Trust Wallet)<\/li><li>Keychain database in its encoded (base64)form<\/li><li>Keychain password in text format<\/li><\/ul><p>[&#8230;]<\/p><p>MacStealer being an unsigned DMG file is also a barrier for anyone, especially beginners, attempting to run the program on a modern mac, said Malwarebytes&rsquo; Reed. &ldquo;Its attempt at phishing for login passwords is not very convincing and would probably only fool a novice user. But such a user is exactly the type who would have trouble opening it.&rdquo;<\/p><\/blockquote>\n<p>I wonder whether this last point means to say that the <em>app<\/em> is unsigned or unnotarized. An <a href=\"https:\/\/c-command.com\/dropdmg\/help\/signing\">unsigned disk image<\/a> is not more difficult to open. It just means that the app will run under <a href=\"https:\/\/mjtsai.com\/blog\/2016\/06\/16\/gatekeeper-path-randomization\/\">translocation<\/a>, which doesn&rsquo;t seem like it would provide any protection in this case.<\/p>\n<p>I&rsquo;m surprised we haven&rsquo;t heard about more malware like this.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2016\/06\/16\/gatekeeper-path-randomization\/\">Gatekeeper Path Randomization<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Jovi Umawing (Hacker News, MacRumors): Users are manipulated to download and execute this file onto their systems. Once achieved, a bogus password prompts users in an attempt to steal their real password. MacStealer then saves the password in the affected system&rsquo;s temporary folder (TMP).The malware then proceeds to collect and save the following also within [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2023-04-28T18:05:55Z","apple_news_api_id":"c0e129df-4fa2-49af-afd8-fece0c7c55ae","apple_news_api_modified_at":"2023-05-01T13:19:08Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/AwOEp30-iSa-v2P7ODHxVrg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[914,466,1396,1583,30,2223,504,355],"class_list":["post-39218","post","type-post","status-publish","format-standard","hentry","category-technology","tag-bitcoin","tag-codesigning","tag-disk-image","tag-keychain","tag-mac","tag-macos-13-ventura","tag-malware","tag-privacy"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/39218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=39218"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/39218\/revisions"}],"predecessor-version":[{"id":39230,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/39218\/revisions\/39230"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=39218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=39218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=39218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}