Apple Mac users are facing a new security threat from malware known as "Cthulhu Stealer," which is designed to compromise personal data and cryptocurrency wallets.
On August 22, Cado Security reported that while macOS has traditionally been seen as secure, malware targeting this platform has been increasing. Cthulhu Stealer, disguised as popular software like CleanMyMac or Adobe GenP, is distributed through Apple disk images (DMGs).
When users open these files, the malware uses macOS tools to prompt for the user’s system password and then requests credentials for Ethereum wallets such as MetaMask, along with other crypto wallets like Coinbase and Binance.
The stolen information is stored in text files, and the malware also gathers additional system details such as IP address. Tara Gould from Cado Security noted that Cthulhu Stealer shares similarities with the Atomic Stealer malware from 2023, suggesting it might be a modified version.
The malware was previously available for rent via Telegram for $500 a month, but disputes have reportedly halted its distribution. Additionally, on August 23, Cointelegraph reported that another malware, AMOS, now has the ability to replicate Ledger Live software.
A decentralized exchange targeted in a multi-million-dollar exploit has recovered its losses just days after the incident, thanks to an unexpected twist involving the hacker themselves.
A recent cyberattack targeting a UK government official’s social media account has highlighted ongoing concerns over digital impersonation and crypto scams.
A former NFT trader is facing potential prison time after admitting to hiding millions in profits from the IRS through undeclared sales of high-value digital assets.
Cybersecurity researchers are sounding the alarm after discovering a new and increasingly sophisticated attack targeting the crypto community.