Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Fraudulent GitHub Repos Spread Atomic Stealer Malware Targeting macOS Users

22:08
 
Share
 

Manage episode 507929359 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspecting victims. Using search engine optimization (SEO) poisoning, attackers ensure that their malicious sites rank highly in Google and Bing results, tricking users searching for software downloads into landing on fraudulent repositories.

Once on the fake GitHub pages, victims are presented with step-by-step instructions that encourage them to execute commands in their macOS Terminal. Instead of installing the advertised software, these commands load the Atomic Stealer infostealer, which is capable of exfiltrating sensitive data, including passwords, crypto wallet details, and personal files.

The campaign demonstrates remarkable persistence and sophistication. Adversaries are using multiple GitHub accounts to host fraudulent repositories, a tactic that helps them evade takedown attempts and maintain operational resilience. Security teams, including LastPass Threat Intelligence, are actively monitoring the campaign and have already flagged and removed several malicious repositories. Shared Indicators of Compromise (IoCs) are enabling organizations to detect and mitigate this ongoing threat.

This attack highlights a dangerous convergence of tactics: exploiting trusted platforms like GitHub and search engines, impersonating widely used brands, and leveraging user trust to deliver malware. For macOS users—long considered less frequent targets—the campaign is a stark reminder that no operating system is immune to sophisticated, trust-based attacks.

#AtomicStealer #macOS #AMOS #GitHub #infostealer #LastPass #1Password #Dropbox #Shopify #SEOpoisoning #cybersecurity #threatintel #malware #datasecurity

  continue reading

353 episodes

Artwork
iconShare
 
Manage episode 507929359 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspecting victims. Using search engine optimization (SEO) poisoning, attackers ensure that their malicious sites rank highly in Google and Bing results, tricking users searching for software downloads into landing on fraudulent repositories.

Once on the fake GitHub pages, victims are presented with step-by-step instructions that encourage them to execute commands in their macOS Terminal. Instead of installing the advertised software, these commands load the Atomic Stealer infostealer, which is capable of exfiltrating sensitive data, including passwords, crypto wallet details, and personal files.

The campaign demonstrates remarkable persistence and sophistication. Adversaries are using multiple GitHub accounts to host fraudulent repositories, a tactic that helps them evade takedown attempts and maintain operational resilience. Security teams, including LastPass Threat Intelligence, are actively monitoring the campaign and have already flagged and removed several malicious repositories. Shared Indicators of Compromise (IoCs) are enabling organizations to detect and mitigate this ongoing threat.

This attack highlights a dangerous convergence of tactics: exploiting trusted platforms like GitHub and search engines, impersonating widely used brands, and leveraging user trust to deliver malware. For macOS users—long considered less frequent targets—the campaign is a stark reminder that no operating system is immune to sophisticated, trust-based attacks.

#AtomicStealer #macOS #AMOS #GitHub #infostealer #LastPass #1Password #Dropbox #Shopify #SEOpoisoning #cybersecurity #threatintel #malware #datasecurity

  continue reading

353 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play