Post

Warning: AMOS and Lumma Stealers Targeting Reddit Crypto Enthusiasts

Discover how AMOS and Lumma stealers are being distributed through Reddit, targeting cryptocurrency traders with malicious software. Learn how to protect yourself from these emerging threats.

Warning: AMOS and Lumma Stealers Targeting Reddit Crypto Enthusiasts

TL;DR

AMOS and Lumma stealers are actively spreading on Reddit, targeting cryptocurrency traders with malicious software disguised as cracked versions of TradingView. These malware variants steal personal data and compromise crypto wallets. Stay vigilant and avoid downloading software from untrusted sources.

AMOS and Lumma Stealers Actively Spreading on Reddit

Cybersecurity experts have issued a warning about the distribution of AMOS and Lumma stealers through Reddit, specifically targeting users engaged in cryptocurrency trading. These malicious programs are disguised as cracked versions of popular trading platforms like TradingView, luring unsuspecting victims into downloading and installing them.

Reddit Posts Targeting Crypto Enthusiasts

Scammers are infiltrating subreddits frequented by cryptocurrency traders, offering free access to TradingView, a web-based platform providing charting tools for analyzing financial markets. The posts claim that the software is completely free and includes premium features, enticing users to download the malicious installers.

Reddit Post Offering Cracked TradingView

Despite warnings about the risks of installing these files, comments from the original poster (OP) downplay the threat, with remarks like “a real virus on a Mac would be wild.”

OP Comment Downplaying the Threat

Downloads Hosted on Unrelated Websites

Upon investigating the links provided in the Reddit posts, it was discovered that the files are hosted on a website belonging to a Dubai cleaning company. This unusual choice of hosting suggests that the scammers may prefer having direct control over the server to update their malicious code easily.

Website Hosting Malicious Files

The website leaks its PHP version (7.3.33), which reached its end of life in December 2021 and no longer receives security updates, making it vulnerable to exploitation.

Outdated PHP Version

Double-Zipped Malware

Both Mac and Windows installers are double-zipped, with the final zip file being password-protected. This distribution method is uncommon for legitimate software, raising red flags about the files’ authenticity.

Mac Installer: AMOS Stealer

On Mac, the installer is a new variant of AMOS, a popular macOS stealer. This version checks for virtual machines and exits with an error code if detected, making it difficult to analyze in a controlled environment.

1
2
3
4
5
6
osascript -e "set memData to do shell script \"system_profiler SPMemoryDataType\"
if memData contains \"QEMU\" or memData contains \"VMware\" then
    do shell script \"exit 42\"
else
    do shell script \"exit 0\"
end if"

AMOS Stealer Code

Analysis of the script reveals that it exfiltrates user data via a POST request to a server hosted in the Seychelles.

Data Exfiltration via POST Request

Windows Installer: Lumma Stealer

On Windows, the payload is delivered through an obfuscated batch file (Costs.tiff.bat) that runs a malicious Autoit script (Sad .com).

1
2
"C:\Windows\system32\cmd.exe" /c expand Costs.tiff Costs.tiff.bat & Costs.tiff.bat
cmd /c copy /b 701617\Sad.com + Io + Thin + Experiment + Detect + Subsection + Meter + Well + Walls + Substantially + Mcdonald 701617\Sad.com

Malicious Batch File

The command and control server for this malware is cousidporke[.]icu, registered recently by an individual in Russia.

Consequences and Protection

Victims of these stealers have reported having their crypto wallets emptied and their contacts receiving phishing links from impersonated accounts. To stay safe, be cautious of the following:

  • Disable Security Software: Be wary of instructions to disable security software to run a program.
  • Password-Protected Files: Avoid downloading files that are password-protected, as this is a common tactic to evade security scanners.
  • Dubious Hosting Platforms: Be cautious of files hosted on dubious or unrelated platforms.

Malwarebytes Protection

Malwarebytes Premium


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

For more details, visit the full article: Malwarebytes Blog

Additional Resources

For further insights, check:

This post is licensed under CC BY 4.0 by the author.