Skip to main content
Protect My Mac — FreeNo credit card required

Atomic Stealer is a stealer targeting macOS, first discovered in 2023. Atomic Stealer (AMOS) is a sophisticated macOS information stealer sold as malware-as-a-service on Telegram for around $1,000/month. It targets browser passwords, cookies, autofill data, cryptocurrency wallets (MetaMask, Coinbase, Phantom, and others), and the macOS Keychain. It uses a fake system password prompt to harvest credentials. CoreLock detects this threat using CoreLock identifies Atomic Stealer through behavioral analysis of fake password prompt injection, YARA signature matching against known AMOS payloads, code signing verification that flags unsigned or ad-hoc signed binaries, and network monitoring that detects exfiltration to Telegram bot endpoints.

DangerStealerDiscovered 2023

Atomic Stealer

Also known as: AMOS, Atomic macOS Stealer

What is Atomic Stealer?

Atomic Stealer (AMOS) is a sophisticated macOS information stealer sold as malware-as-a-service on Telegram for around $1,000/month. It targets browser passwords, cookies, autofill data, cryptocurrency wallets (MetaMask, Coinbase, Phantom, and others), and the macOS Keychain. It uses a fake system password prompt to harvest credentials.

How It Spreads

Fake application installers advertised through Google Ads and SEO poisoning

Malicious DMG files disguised as legitimate software like Notion, Photoshop, or Slack

Phishing websites impersonating popular download portals

Telegram channels distributing cracked software

Signs of Infection

Unexpected system password prompts from unsigned applications

Browser extensions or wallet balances disappearing without explanation

Unknown processes running with names mimicking system services

Outbound connections to suspicious Telegram bot API endpoints

How to Remove Atomic Stealer

1

Disconnect from the internet

Immediately disconnect your Mac from Wi-Fi or Ethernet to prevent the stealer from exfiltrating additional data to its command-and-control server.

2

Identify and kill the malicious process

Open Activity Monitor and look for unfamiliar processes with high CPU or network usage. Force-quit any suspicious process you do not recognize.

3

Remove the malicious application

Drag the fake application from /Applications or ~/Downloads to the Trash. Check ~/Library/LaunchAgents and /Library/LaunchDaemons for persistence plists and remove them.

4

Change all compromised credentials

Reset passwords for every account stored in your browser or Keychain. Enable two-factor authentication on all critical accounts, especially cryptocurrency exchanges.

5

Run a full system scan with CoreLock

Perform a deep scan to detect any remaining artifacts, persistence mechanisms, or secondary payloads that may have been dropped by the stealer.

Prevention Tips

Only download software from official websites or the Mac App Store

Verify code signatures before opening any DMG or installer file

Be skeptical of sponsored search results leading to download pages

Use CoreLock's real-time monitoring to catch unsigned processes immediately

How CoreLock Detects Atomic Stealer

Real-time Detection

CoreLock identifies Atomic Stealer through behavioral analysis of fake password prompt injection, YARA signature matching against known AMOS payloads, code signing verification that flags unsigned or ad-hoc signed binaries, and network monitoring that detects exfiltration to Telegram bot endpoints.

Frequently Asked Questions

What does Atomic Stealer steal from my Mac?

Atomic Stealer targets browser passwords, cookies, and autofill data from Chrome, Firefox, Brave, and Edge. It also steals cryptocurrency wallet data, Keychain passwords, and local files matching specific extensions. It uses a fake system dialog to trick you into entering your Mac password.

How do I know if my Mac has Atomic Stealer?

Look for unexpected password prompts from applications you just installed, missing cryptocurrency balances, unfamiliar browser extensions, or strange processes in Activity Monitor. CoreLock can detect AMOS in seconds with its behavioral analysis engine.

Can Atomic Stealer bypass macOS Gatekeeper?

AMOS distributors instruct victims to right-click and Open the DMG, bypassing Gatekeeper's first-launch warning. The malware itself is typically ad-hoc signed or unsigned, which is why code signing verification tools like CoreLock catch it immediately.

Is Atomic Stealer still active in 2024-2025?

Yes. AMOS has been continuously updated since its 2023 debut, with new variants adding support for more wallets and browsers. It remains one of the most prevalent macOS stealers, distributed through an active malware-as-a-service operation on Telegram.

Protect Your Mac from Atomic Stealer

Download CoreLock to detect and remove Atomic Stealer and other macOS threats. AI-powered analysis, real-time monitoring, and one-click remediation.

Download CoreLock Free

Available for macOS and Windows