So here we go again. The AMOS Mac malware is back in the game, and this time itās wearing a new disguise. The sneaky psychos behind this attack have decided to impersonate Loom, the popular screen recording app with over 20 million users.
And guess what? Theyāre using Google Ads to pull in victims, making this operation look as legit as it gets. The plan? Get unsuspecting users to download a fake version of Loom from a phony website.

Researchers at Moonlock Lab report that this latest version is also cloning legitimate crypto wallet apps, like Ledger Live. Yup, the AMOS stealer is replacing these trusted apps with malicious clones.
Once on your Mac, itās game over. Your crypto wallets, browser data, passwordsāall up for grabs.Ā The group behind this, possibly called āCrazy Evil,ā seems well-organized and linked to Russian cybercriminal networks.
People would click on these ads, thinking theyāre getting the real deal, and instead, theyād be redirected to some sketchy site called smokecoffeeshop[.]com.Ā
From there, things got weirder. Victims would end up on a website that looks exactly like Loomās, but itās a trap. A click on the download button, and boomāyour Mac is now infected with the new AMOS stealer.
This is a polished product on the black market. Renting it out could cost up to $3,000 a month. And why so expensive? Because this thing does it all. It steals files, nabs browser history, grabs credentials, empties your crypto walletsāthe whole nine yards.Ā
This is top-shelf malware, folks.
Theyāve cloned other apps tooāFigma, TunnelBlick (a VPN), Callzy, and even a bizarre case called BlackDesertPersonalContractforYouTubepartners[.]dmg.
Moonlock found some clues linking Crazy Evil to this campaign on the dark web. They stumbled upon a recruitment ad looking for people to join a team usingāyou guessed itāthe AMOS stealer.Ā
This ad even bragged about its ability to replace āLedgerā on macOS, confirming that the same AMOS version found in the wild was being pushed by these guys, impersonating Loom.Ā
Further digging revealed an IP address tied to this messā85[.]28[.]0[.]47. When Moonlock ran this IP through VirusTotal, a site that checks for malware, it flagged 93 files as malicious.Ā
And get thisāthose files had connections to a Russian government entity. Coincidence? Maybe, but probably not.Ā The IPās Internet Service Provider (ISP) was listed as Gorodskaya elektronnaya svyaz Ltd, aka Gesnet[.]ru, a Russian company.Ā
Gesnet seems to run a big network, but good luck finding any detailed info about them. The Russian ISP market is murky, to say the least, with strict laws that make transparency nearly impossible for outsiders.
For now, the best defense is a good offense. Stay vigilant, donāt click on shady ads, and for the love of crypto, keep an eye on your apps.
Want your project in front of cryptoās top minds? Feature it in our next industry report, where data meets impact.

