Magazine

Big Danger for Apple Users! Dangerous Virus of macOS Being Sold Openly on Telegram

Posted on the 01 May 2023 by Mayankgupta
cyber

cyber

apple Cyber ​​criminals have prepared a new malware ie virus for the users. This virus collects the necessary information of users from macOS. Cyber ​​criminals are openly selling this virus on Telegram. Sold on a channel on the instant messaging app, the virus will target macOS users and collect data from the user’s system to autofill information such as passwords, wallets, etc.

According to the report of cyber research firm CRIL (Cyber ​​Research and Intelligence Labs), cyber criminals are selling malware named macOS Stealer (AMOS) for Apple devices. This malware steals personal information, such as passwords, wallets, etc., from the user’s Apple system. Cyber ​​researchers told that hackers are selling this virus through a Telegram channel. Not only this, hackers are also upgrading this virus so that it can cause maximum harm to the users.

steal personal information

The latest updated version of the virus has been spotted in a Telegram post made on April 25, highlighting its features. According to the report, Atomic macOS Stealer can get many types of information from users’ machines. These include keychain passwords, complete system information, files in the Desktop’s Documents folders, and macOS passwords. This atomic malware can target multiple web browsers and steal auto-fill, passwords, cookies, wallet and credit card information.

$1,000 is the price

The cyber researcher firm claims that AMOS can also target crypto wallets such as Isektrum, Binance, Exodus, Atomic and Coinomi. Not only this, it can also offer many types of services to the user. Hackers are selling this dangerous virus on Telegram for $ 1,000 i.e. around Rs 82,000 per month. According to the report of cyber firm, this AMOS virus created by hackers installs .dmg file in the system and starts stealing information.

After installing this malware, hackers authenticate it through user password. After the installation of this file, sensitive information starts gathering from the users’ system and is sent to the remote server.



&version;


Back to Featured Articles on Logo Paperblog