Cybersecurity researchers have uncovered a new information stealer that’s designed to target macOS hosts and harvest “a wide range of information,” reports The Hacker News.
Dubbed Cthulhu Stealer, the malware has been available under a malware-as-a-service (MaaS) model for US$500 a month from late 2023. It’s capable of targeting both x86_64 and Arm architectures.
“Cthulhu Stealer is an Apple disk image (DMG) that is bundled with two binaries, depending on the architecture,” Cato Security researcher Tara Gould said. “The malware is written in Golang and disguises itself as legitimate software.”
She adds that the main functionality of Cthulhu Stealer is to steal credentials and cryptocurrency wallets from various stores, including game accounts. Some of the software programs it impersonates include CleanMyMac, Grand Theft Auto IV, and Adobe GenP.
“While macOS has long been considered a secure system, the existence of malware targeting Mac users remains an increasing security concern,” Gould says. “Although Cthulhu Team is seemingly no longer active, this serves as a reminder that Apple users are not immune to cyber threats. It’s crucial to remain vigilant and exercise caution, particularly when installing software from unofficial sources.”
To protect yourself from potential threats, always download software from trusted sources, such as the Apple App Store or the official websites of reputable developers. Enable macOS’s built-in security features such as Gatekeeper, which helps prevent the installation of unverified apps. Keep your system and applications up to date with the latest security patches. Additionally, consider using reputable antivirus software to provide an extra layer of protection.