New Malvertising Campaign Spreading Updated Atomic Stealer Malware
- A new malvertising campaign is spreading an updated version of the macOS stealer malware, Atomic Stealer.
- Atomic Stealer, first seen in April 2023, is an off-the-shelf Golang malware costing a whopping $1,000 per month.
- New variants of the malware have been seen since its inception, with improved data-gathering capabilities.
A Not-So-New Player: Atomic Stealer is Back
An oldie but a badie, the notorious Atomic Stealer is back on the scene, and it’s gone through some updates. Paying no heed to the saying ‘You can’t teach an old malware new tricks,’ the latest malvertising campaign is spreading the malware like it’s going out of fashion – only a lot less stylish.
Off-the-Shelf But Far From Bargain Bin
Normally, when something’s off-the-shelf, it’s easy to acquire and it’s easier on the wallet – not the case with Atomic Stealer. First rearing its ugly code in April 2023, this Golang malware isn’t exactly a freeloader’s best friend. With a hefty $1,000 per month price tag, it’s definitely on the ‘more harm than your mother-in-law’s criticism’ end of the scale.
New Variants: Because Evil Never Rests
Like your dad’s obsession with corny jokes (what did the grape say when it got stepped on? Nothing, it just let out a little wine), Atomic Stealer doesn’t stop, despite pleas from the universe. New variants have cropped up since its initial appearance, showcasing a disturbing evolution with more advanced capabilities for recovering and stealing information from infected systems.
In a nutshell, Atomic Stealer is old malware that’s back with a vengeance, distributed through a new malvertising campaign. It comes with an extravagant price tag and is constantly being updated by its unrelenting developer. It’s like that bad joke your dad tirelessly repeats at family gatherings – you wish it would stop, but you know it’s here to stay. Oh, the dread!