Main

type

5 (blog/news article)

status

21 (imported old-v2, waiting for another import)

review version

0

cleanup version

0

pending deletion

0 (-)

created at

2025-10-27 07:55:24

updated at

2025-10-27 07:55:24

Address

url

https://www.infostealers.com/article/atomic-stealer-threat-actor-spawns-second-variant-of-macos-malware-sold-on-telegram/

url length

121

url crc

6567

url crc32

2123176359

location type

1 (url matches target location, page_location is empty)

canonical status

10 (verified canonical url)

canonical page id

2835458831

Source

domain id

27178280

domain tld

2211

domain parts

0

originating warc id

-

originating url

https://data.commoncrawl.org/crawl-data/CC-MAIN-2025-33/segments/1754151280328.73/warc/CC-MAIN-20250811100340-20250811130340-00646.warc.gz

source type

11 (CommonCrawl)

Server response

server ip

18.153.244.78

Publication date

2025-08-11 10:39:57

Fetch attempts

0

Original html size

151401

Normalized and saved size

111165

Content

title

Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram.

excerpt

content

Recent weeks have seen a number of macOS-specific infostealers appear for sale in crimeware forums, including Pureland, MacStealer and Amos Atomic Stealer. Of these, Atomic Stealer has offered by far the most complete package, promising cybercriminals a full-featured if not particularly sophisticated infostealer. Atomic can grab account passwords, browser data, session cookies, and crypto wallets, and in the version being advertised on Telegram, threat actors can manage their campaigns through a web interface rented out from the developer for $1000 per month. The threat actor, however, has been busy looking for other ways to target macOS users with a different version of Atomic Stealer. In this post, we take a closer look at how Atomic Stealer works and describe a previously unreported second variant. We also provide a comprehensive list of indicators to aid threat hunters and security teams defending macOS endpoints. Read More

author

updated

1763555348

Text analysis

block type

0

extracted fields

233

extracted bits

featured image
title
full content
content was extracted heuristically
OpenGraph suggests this is an article

detected location

0

detected language

1 (English)

category id

Serwisy SEC (10)

index version

2025110801

paywall score

0

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

777

text words

144

text unique words

109

text lines

1

text sentences

7

text paragraphs

1

text words per sentence

20

text matched phrases

4

text matched dictionaries

2