{"id":136249,"date":"2024-08-27T12:00:45","date_gmt":"2024-08-27T09:00:45","guid":{"rendered":"https:\/\/cryptodnes.bg\/en\/?p=136249"},"modified":"2024-08-26T16:47:01","modified_gmt":"2024-08-26T13:47:01","slug":"new-malware-targets-mac-users-and-crypto-wallets","status":"publish","type":"post","link":"https:\/\/cryptodnes.bg\/en\/new-malware-targets-mac-users-and-crypto-wallets\/","title":{"rendered":"New Malware Targets Mac Users and Crypto Wallets"},"content":{"rendered":"

On August 22, Cado Security reported<\/a><\/strong> that while macOS has traditionally been seen as secure, malware targeting this platform has been increasing. Cthulhu Stealer, disguised as popular software like CleanMyMac or Adobe GenP, is distributed through Apple disk images (DMGs).<\/p>\n

When users open these files, the malware uses macOS tools to prompt for the user\u2019s system password and then requests credentials for Ethereum wallets such as MetaMask, along with other crypto wallets like Coinbase and Binance.<\/p>\n

The stolen information is stored in text files, and the malware also gathers additional system details such as IP address. Tara Gould from Cado Security noted that Cthulhu Stealer shares similarities with the Atomic Stealer malware from 2023, suggesting it might be a modified version.<\/p>\n