Cybercriminals Use AI Trust to Spread AMOS Malware on macOS Systems

Cybercriminals Exploit AI Trust to Deploy AMOS Stealer on macOS

In a concerning development, cybercriminals are leveraging the credibility of artificial intelligence platforms like ChatGPT and Grok to distribute the Atomic macOS Stealer (AMOS). This sophisticated campaign combines social engineering with technical manipulation, exploiting user trust in AI-generated content to compromise macOS systems.

The Deceptive Strategy

The attack begins when users perform routine Google searches for common macOS troubleshooting solutions, such as clear disk space on macOS. Cybercriminals have strategically placed sponsored advertisements and manipulated search engine optimization (SEO) to ensure that their malicious links appear prominently in search results. These links direct users to seemingly legitimate AI-generated conversations hosted on official ChatGPT and Grok domains.

Once on these platforms, users encounter professional-looking troubleshooting guides. The AI-generated conversations instruct users to open the macOS Terminal and execute specific commands purportedly designed to resolve their issues. Due to the authoritative appearance of these instructions and the reputable domains hosting them, users are more likely to comply without suspicion.

Execution of the Attack

The commands provided in these AI conversations are crafted to download and execute a base64-encoded script directly from attacker-controlled servers. This method bypasses traditional security measures like macOS Gatekeeper, as the execution is initiated by the user, who believes they are following legitimate troubleshooting steps.

Once executed, the script installs the AMOS stealer, a potent piece of malware designed to harvest sensitive information from the infected system. AMOS targets a wide range of data, including:

– Browser Credentials: Extracting saved passwords, cookies, and autofill information from browsers like Safari, Chrome, and Firefox.

– Cryptocurrency Wallets: Accessing wallet data from applications such as Electrum, Exodus, Coinbase, MetaMask, and Ledger Live, enabling the theft of digital assets.

– System Information: Collecting details about the operating system, hardware, and network configurations.

– Personal Files: Scanning directories like Desktop and Documents for files with extensions such as .txt, .pdf, .doc, .wallet, and .key, and exfiltrating them to attacker-controlled servers.

Persistence and Evasion Techniques

To maintain long-term access to the compromised system, AMOS employs several persistence mechanisms:

– LaunchDaemons: Creating and installing LaunchDaemon services that execute the malware at system startup.

– Credential Validation: Utilizing native macOS utilities like `dscl` to silently validate user credentials without triggering graphical prompts, thereby avoiding user suspicion.

– Root Privileges: Using the validated credentials to gain root access via `sudo -S`, allowing the malware to perform actions that require administrative privileges.

These techniques enable the malware to operate stealthily, making detection and removal more challenging.

Broader Implications

This campaign signifies a dangerous shift in cybercriminal tactics, moving from exploiting technical vulnerabilities to manipulating behavioral trust. By hosting malicious content on reputable AI platforms and using paid advertisements to increase visibility, attackers effectively bypass traditional security defenses and exploit the inherent trust users place in these platforms.

Similar tactics have been observed in other campaigns targeting macOS users. For instance, attackers have used fake Microsoft Teams sites to distribute the Odyssey macOS stealer, employing social engineering techniques to trick users into executing malicious code. Additionally, threat actors have leveraged Reddit posts to spread AMOS and Lumma stealers by offering fake cracked versions of popular trading platforms.

Recommendations for Users and Organizations

To mitigate the risks associated with such sophisticated attacks, users and organizations should adopt the following practices:

1. Exercise Caution with Terminal Commands: Be wary of instructions that require executing commands in the Terminal, especially those obtained from online forums, AI-generated content, or unsolicited communications.

2. Verify Sources: Ensure that troubleshooting guides and software downloads originate from official and reputable sources.

3. Monitor for Anomalies: Regularly check for unusual system behavior, such as unexpected prompts for system passwords, unauthorized network connections, or the presence of unfamiliar files and services.

4. Educate Users: Provide training on recognizing social engineering tactics and the importance of verifying the authenticity of online content, even when it appears on trusted platforms.

5. Implement Security Measures: Utilize endpoint protection solutions that can detect and prevent the execution of unauthorized scripts and monitor for indicators of compromise associated with known malware families like AMOS.

By remaining vigilant and adopting these proactive measures, users and organizations can better protect themselves against the evolving landscape of cyber threats that exploit trust in emerging technologies.