Contact

info@th3fus3.com



© 2025 TheFuse. All rights reserved.

Cthulhu Stealer Malware

New Malware Targets macOS Users

August 26, 2024 10:10 AM

Reading time: 1 minute, 57 seconds

TL;DR Cado Security has discovered Cthulhu Stealer, a malware-as-a-service targeting macOS users. Scammers charge $500/month for this malware, promoting it via Telegram and targeting users with fake job offers.

Cado Security's discovery has thoroughly debunked the belief that macOS systems are impervious to malware. This revelation concerns a new malware-as-a-service (MaaS) called Cthulhu Stealer, which targets macOS users through deceptive means.

The rise of Cthulhu Stealer indicates that no system is completely secure against cyber threats. Cthulhu Stealer disguises itself as legitimate applications such as CleanMyMac and Adobe GenP and software claiming to be an early release of 'Grand Theft Auto VI.' Once the user mounts the malicious DMG file, they are prompted to enter the system and MetaMask passwords. This initial deception is just the beginning.

Unmasking the Deception

Following the credentials input, the malware utilizes osascript, a macOS tool, to extract passwords from the system's Keychain. This data, including details from crypto wallets like MetaMask, Coinbase, and Binance, is compiled into a zip archive. This archive, identified by the user's country code and the time of the attack, contains the stolen information.

Cthulhu Stealer also steals data from other platforms, including:

  • Email accounts
  • Social media profiles
  • Banking applications

Moreover, Cthulhu Stealer collects detailed system information such as IP address, system name, and OS version. It then sends this data to a command and control (C2) server, enabling the attackers to refine their strategies.

The Scammers' Tactics

Scammers use various strategies to trap the victims into installing the malware. For example, on social media, some scammers pose as employers who offer jobs that require downloading software to track working hours. These offers come with a sense of urgency, pushing the potential victim to download the application quickly.

The developers and affiliates behind Cthulhu Stealer, known as the Cthulhu Team, use Telegram to manage their operations.

'The stealer appears to be being rented out to individuals for $500/month, with the main developer paying out a percentage of earnings to affiliates based on their deployment. Each affiliate of the stealer is responsible for the deployment of the malware. Cado has found Cthulhu stealer sold on two well-known malware marketplaces which are used for communication, arbitration and advertising of the stealer, along with Telegram,' Cado informed readers.

Protecting Against Cthulhu Stealer

To protect themselves, users should install reputable antivirus software that is specifically designed for macOS. They should also be cautious of employment opportunities that require immediate software downloads. Regular software updates can further reduce the risk of malware infections.

Share this

Similar news
cryptocurrency

Peirce's Vision for Crypto

SEC's Crypto Mom on Regulatory Durability

March 27, 2025 01:15 AM
cryptocurrency

SEC Sets Target on Yet Another Crypto Market Maker

Crypto Market Maker Faces Legal Battle

October 11, 2024 01:00 PM
cryptocurrency

Striple Scores One-Day, 70-Country Stablecoin Payment Success

Stripe had previously discontinued Bitcoin payments due to high fees and slow confirmation times

October 11, 2024 11:59 AM
All results loaded