Cybersecurity researchers have uncovered a brand new info stealer that is designed to focus on Apple macOS hosts and harvest a variety of knowledge, underscoring how menace actors are more and more setting their sights on the working system.
Dubbed Cthulhu Stealer, the malware has been out there underneath a malware-as-a-service (MaaS) mannequin for $500 a month from late 2023. It is able to focusing on each x86_64 and Arm architectures.
“Cthulhu Stealer is an Apple disk picture (DMG) that’s bundled with two binaries, relying on the structure,” Cato Safety researcher Tara Gould mentioned. “The malware is written in Golang and disguises itself as professional software program.”
Among the software program applications it impersonates embody CleanMyMac, Grand Theft Auto IV, and Adobe GenP, the final of which is an open-source instrument that patches Adobe apps to bypass the Artistic Cloud service and prompts them with no serial key.
Customers who find yourself launching the unsigned file after explicitly permitting it to be run – i.e., bypassing Gatekeeper protections – are prompted to enter their system password, an osascript-based approach that has been adopted by Atomic Stealer, Cuckoo, MacStealer, and Banshee Stealer.
Within the subsequent step, a second immediate is offered to enter their MetaMask password. Cthulhu Stealer can be designed to reap system info and dump iCloud Keychain passwords utilizing an open-source instrument referred to as Chainbreaker.
The stolen information, which additionally includes internet browser cookies and Telegram account info, is compressed and saved in a ZIP archive file, after which it is exfiltrated to a command-and-control (C2) server.
“The principle performance of Cthulhu Stealer is to steal credentials and cryptocurrency wallets from varied shops, together with sport accounts,” Gould mentioned.
“The performance and options of Cthulhu Stealer are similar to Atomic Stealer, indicating the developer of Cthulhu Stealer most likely took Atomic Stealer and modified the code. Using osascript to immediate the consumer for his or her password is comparable in Atomic Stealer and Cthulhu, even together with the identical spelling errors.”
The menace actors behind the malware are mentioned to be not lively, partly pushed by disputes over funds which have led to accusations of exit rip-off by associates, leading to the principle developer being completely banned from a cybercrime market used to promote the stealer.
Cthulhu Stealer is not notably subtle and lacks anti-analysis strategies that would permit it to function stealthily. Additionally it is wanting any standout characteristic that distinguishes it from different related choices within the underground.

Whereas threats to macOS are a lot much less prevalent than to Home windows and Linux, customers are suggested to obtain software program solely from trusted sources, steer clear of putting in unverified apps, and preserve their programs up-to-date with the most recent safety updates.
The surge in macOS malware hasn’t gone unnoticed by Apple, which, earlier this month, introduced an replace to its subsequent model of the working system that goals so as to add extra friction when making an attempt to open software program that is not signed accurately or notarized.
“In macOS Sequoia, customers will not be capable of Management-click to override Gatekeeper when opening software program that is not signed accurately or notarized,” Apple mentioned. “They will want to go to System Settings > Privateness & Safety to assessment safety info for software program earlier than permitting it to run.”