The threat of malware for Apple users has increased significantly in recent years. Now security experts are reporting on another program that steals passwords and other data from victims’ computers.
Just a week ago, we reported on a malware called Banshee Stealer that steals data such as passwords and browser cookies. Apple users are deceived with a fake password prompt. The malware developed by Cado Security discovered Cthulhu Stealer.
The malware disguises itself as an Apple Disk Image of a software such as CleanMyMac, Adobe GenP or GTA VI. Once opened by the user, the malware displays a prompt to enter a password using the MacOS command line tool Osa-Script. As with the Banshee Stealer, it states that the system settings must be updated.
As soon as the password has been entered, the malware creates a folder under the path “/User/Shared/NW” in which the keychain passwords, browser cookies or log-ins to crypto exchanges and gaming accounts that are now accessible to it are stored as a text file. The information is then sent to the attackers’ servers as a zip file. The Cthulhu Stealer is offered as malware-as-a-service to individual buyers for a price of 500 US dollars per month via relevant marketplaces on the Internet. It infects both Intel Macs and devices with Apple’s own ARM chips.
To protect yourself from the threat or to minimize the risk, the security researchers at Cado Security recommend that all macOS users follow the following advice:
Although the security researchers also note that the Cthulhu stealer team no longer seems to be active, the malware once again shows that Apple devices are also at risk from viruses and other malware. Although the view of macOS as an inherently secure system has long persisted, users must be vigilant due to the ever-increasing security threats.
Digital marketing enthusiast and industry professional in Digital technologies, Technology News, Mobile phones, software, gadgets with vast experience in the tech industry, I have a keen interest in technology, News breaking.