Beware: Atomic Stealer Malware Exploits Fake Chrome and Safari Updates for Password and Credit Card Theft

0

In a concerning development, the notorious Atomic Stealer malware, recognized for pilfering sensitive data such as passwords and credit card details from Windows systems, has expanded its crosshairs to target macOS users. Safeguarding against this evolving threat requires heightened awareness and strategic measures.

Image Source: Unsplash


Earlier this year, security researchers unearthed a novel malware strain dubbed 'Atomic Stealer.' Employing a cunning stratagem, this malware dupes users into installing it by presenting a counterfeit Chrome update page, coercing individuals into believing that an immediate browser update is essential to access content on a given website.


Operating by exploiting vulnerabilities and commandeering websites through intricate JavaScript instructions, the malware, in October, demonstrated its adaptability by utilizing Binance’s Smart Chain contracts blockchain technology to obfuscate its scripts. The infection vector for Windows-powered machines was executed under the moniker 'ClearFake.'

(Image Source: Malwarebytes)


A recent disclosure on the Infosec Exchange platform by cybersecurity researcher Ankit Anubhav underscores that the 'ClearFake' campaign has now broadened its impact to include macOS users. Subsequent confirmation of this infiltration was provided by leading cybersecurity firm Malwarebytes.


When users navigate to a compromised website ensnared by ClearFake, they encounter a deceptive Chrome or Safari update page, enticing them to install the purported latest version for seamless access to the site's content. Remarkably authentic in appearance and available in multiple languages, the fraudulent update page serves as the malware's gateway.


Should users fall victim to the ruse and proceed to download and install the update from the counterfeit page, Atomic Stealer exfiltrates a trove of sensitive information, including passwords, credit card numbers, Wi-Fi credentials, website logins, documents, and cookies, from both Windows and macOS environments.


As reported by Bleeping Computer, the ill-gotten information is subsequently peddled by cybercriminals through Telegram channels, fetching a market price of approximately $1,000 per month. Notably, despite its initial discovery in March, Atomic Stealer continues to elude detection by roughly half of the antivirus engines employed by the widely utilized malware scanning platform, VirusTotal.


Mitigating the risk posed by this malware necessitates a cautious approach. Users are advised to refrain from executing browser updates prompted by dubious pages and exclusively utilize the built-in updater tool, ensuring the secure acquisition of the latest browser version. Heightened vigilance is paramount to shield sensitive information from falling prey to the pernicious grasp of Atomic Stealer.

Post a Comment

0Comments
Post a Comment (0)