Fake TradingView Premium posts on Reddit spread Vidar and AMOS stealers


A live malware campaign is using fake Reddit posts that promise free TradingView Premium access to infect victims with Vidar on Windows and Atomic macOS Stealer, also known as AMOS, on Macs. The campaign targets traders, crypto users, and anyone looking for cracked premium software.

According to the research cited in current coverage, the attackers used Reddit posts and aged accounts to make the scam look legitimate, then pushed victims to download malicious files from unrelated external sites. The Windows payload delivered Vidar, while the macOS version delivered AMOS, a well-known infostealer that targets browser data, credentials, cookies, and wallet-related information.

The campaign matters because it combines a familiar lure with cross-platform malware delivery. It also shows how attackers continue to abuse trusted communities and popular software brands to steal credentials, session tokens, and crypto wallet data.

How the Reddit lure works

The scam offers a simple pitch: download a “cracked” version of TradingView Premium for free. Current reporting says the posts appeared across multiple subreddits and used older Reddit accounts to create a false sense of trust.

Researchers said the operation showed clear discipline. When domains got flagged, the actor swapped them out quickly, while warning comments from real users were reportedly removed just as fast. That suggests an active campaign, not an abandoned one-off post.

The lures also separated downloads by platform, including distinct options for Windows and macOS. That kind of targeting increases the chance that victims will run the file instead of abandoning the install halfway through.

Campaign snapshot

ItemDetails
Main lureFake free TradingView Premium downloads
Distribution channelReddit posts and subreddit activity
Windows payloadVidar infostealer
macOS payloadAMOS, also called Atomic macOS Stealer
Main targetsTraders, crypto users, retail investors
Main goalSteal credentials, cookies, session data, and wallet files

What happens on Windows and macOS

On Windows, the downloaded file reportedly used heavy padding to grow far beyond normal size, which can help malware avoid some scanning workflows. Current coverage says the real payload sat inside a smaller self-extracting archive that rebuilt Vidar through an obfuscated script.

Reddit profile of u – BroadDepartment573 showing the Four Year Club trophy alongside an otherwise empty activity history (Source – Hexastrike)

On macOS, the lure arrived as a disk image that looked like a branded TradingView installer. Reporting says the payload decrypted and launched AMOS at runtime, then harvested data from browsers and crypto wallet software.

Microsoft’s recent guidance on macOS infostealers matches that pattern closely. The company says modern stealers target browser data, cookies, saved credentials, keychains, and developer or wallet-related secrets, often by abusing trusted-looking delivery channels and native utilities.

Entropy graph of the executable showing the resource section filled almost entirely with zero-byte padding (Source – Hexastrike)

Why this campaign is dangerous

This is not just about one fake download. Infostealers often turn a single careless install into account theft across email, trading platforms, cloud tools, browsers, and crypto wallets. Microsoft also notes that stolen credentials and session data can fuel later account takeovers and broader attacks.

The macOS side also matters more than many users assume. Apple says Gatekeeper checks downloaded software for known malware and certificate issues, but attackers still try to work around that protection by using convincing branding and social engineering to get users to run risky apps.

Cracked software remains one of the easiest ways for criminals to reach victims because the victim often disables their own caution. Once that happens, the attacker no longer needs a browser exploit or a phishing login page. The victim installs the malware for them. This last sentence is an inference based on the campaign design and Microsoft’s explanation of trojan behavior.

Mounted TradingView DMG showing the application icon over a branded background designed to appear like a legitimate installer (Source – Hexastrike)

Main warning signs

  • Reddit posts offering free premium software or cracked tools should be treated as high risk.
  • Large ZIP files or installers downloaded from unrelated domains deserve immediate suspicion.
  • Branded macOS disk images do not prove that an app is safe or signed. Apple says Gatekeeper still checks whether software is signed and notarized.
  • Infostealers often go after browser credentials, cookies, and wallet data first.

What users and organizations should do now

Anyone who downloaded one of these fake TradingView builds should assume compromise until proven otherwise. That means changing passwords, rotating saved credentials, signing out of active sessions, and moving crypto assets to clean wallets if wallet files or seed material may have been exposed. This recommendation follows directly from the reported stealer behavior and official infostealer guidance.

Organizations should block the known distribution domains, review proxy and DNS logs, and hunt for suspicious sequences such as Reddit browsing followed by large downloads from unrelated sites. On endpoints, defenders should also watch for unusual child processes, unsigned apps, and signs of credential dumping or browser data theft.

Apple recommends opening apps only from trusted sources, and Microsoft advises defenders to watch for malware that masquerades as legitimate software to trick users into installation. Those basic rules still matter because this campaign relies on trust and curiosity more than technical novelty.

Response checklist

PriorityActionWhy it matters
HighStop using the downloaded file immediatelyPrevents further execution or reinfection
HighChange passwords and revoke active sessionsStealers often grab credentials and cookies
HighMove sensitive crypto assets from exposed walletsWallet files may have been copied
MediumScan the device and review browser-stored secretsHelps scope the damage
MediumBlock related domains and inspect DNS or proxy logsCan reveal more victims
MediumReinstall from clean sources if compromise is confirmedReduces the chance of persistence

Bottom line

This Reddit campaign worked because it used a believable lure, familiar branding, and platform-specific malware. Victims thought they were getting premium charting software for free, but they were really handing over credentials, cookies, and wallet data.

The broader lesson is simple. If a download promises paid software for nothing, especially through Reddit or another community post, you should assume the real product is malware until proven otherwise. That conclusion fits both the reported campaign and Microsoft’s official description of trojans that pretend to be harmless software.

For traders, crypto users, and teams that manage financial accounts, this kind of infostealer campaign can lead to immediate losses. A single install can expose browser sessions, passwords, and wallet data within seconds.

FAQ

What malware did the fake TradingView Premium posts deliver?

Current reporting says the Windows payload delivered Vidar, while the macOS version delivered AMOS, also called Atomic macOS Stealer.

Who did this campaign target?

The campaign mainly targeted retail traders, crypto users, and people looking for free or cracked TradingView Premium downloads on Reddit.

Does Apple’s Gatekeeper stop every malicious installer?

No. Apple says Gatekeeper checks downloaded software for known malware and signing or notarization status, but users can still face risk from convincing lures and unsafe app-opening choices.

What should I do if I downloaded one of these files?

Treat the device as compromised, change passwords, revoke sessions, scan the machine, and move sensitive financial or wallet assets to clean environments. This is based on the reported stealer behavior and official infostealer guidance.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages