id
type
5 (blog/news article)
status
21 (imported old-v2, waiting for another import)
review version
0
cleanup version
0
pending deletion
0 (-)
created at
2025-10-27 07:55:24
updated at
2025-10-27 07:55:24
url
https://www.infostealers.com/article/atomic-stealer-threat-actor-spawns-second-variant-of-macos-malware-sold-on-telegram/
url length
121
url crc
6567
url crc32
2123176359
location type
1 (url matches target location, page_location is empty)
canonical status
10 (verified canonical url)
canonical page id
domain id
domain tld
2211
domain parts
0
originating warc id
-
originating url
https://data.commoncrawl.org/crawl-data/CC-MAIN-2025-33/segments/1754151280328.73/warc/CC-MAIN-20250811100340-20250811130340-00646.warc.gz
source type
11 (CommonCrawl)
server ip
Publication date
2025-08-11 10:39:57
Fetch attempts
0
Original html size
151401
Normalized and saved size
111165
title
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram.
excerpt
content
Recent weeks have seen a number of macOS-specific infostealers appear for sale in crimeware forums, including Pureland, MacStealer and Amos Atomic Stealer. Of these, Atomic Stealer has offered by far the most complete package, promising cybercriminals a full-featured if not particularly sophisticated infostealer. Atomic can grab account passwords, browser data, session cookies, and crypto wallets, and in the version being advertised on Telegram, threat actors can manage their campaigns through a web interface rented out from the developer for $1000 per month. The threat actor, however, has been busy looking for other ways to target macOS users with a different version of Atomic Stealer. In this post, we take a closer look at how Atomic Stealer works and describe a previously unreported second variant. We also provide a comprehensive list of indicators to aid threat hunters and security teams defending macOS endpoints. Read More
author
updated
1763555348
block type
0
extracted fields
233
extracted bits
featured image
title
full content
content was extracted heuristically
OpenGraph suggests this is an article
detected location
0
detected language
1 (English)
category id
index version
2025110801
paywall score
0
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
777
text words
144
text unique words
109
text lines
1
text sentences
7
text paragraphs
1
text words per sentence
20
text matched phrases
4
text matched dictionaries
2
links self subdomains
0
links other subdomains
0
links other domains
7
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
1
links ext klim
0
links ext generic
0