Shamos Infostealer Targeting Mac Devices via ClickFix Attacks
Summary
Hide ▲
Show ▼
In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks execution of pasted commands and warns users of potential risks, directly targeting ClickFix-style social engineering attacks used to distribute malware such as Shamos and MacSync. Since June 2025, the COOKIE SPIDER group’s Shamos infostealer has targeted Mac devices via ClickFix attacks, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early variants relied on malvertising and fake GitHub repositories to trick users into executing shell commands, while later MacSync variants used digitally signed, notarized Swift applications to bypass Gatekeeper checks. Recent campaigns have leveraged legitimate platforms like Cloudflare Pages and Squarespace to host malicious installers, with ClickFix evolving to require minimal user pretexts.
Timeline
-
16.03.2026 13:41 2 articles · 15d ago
ClickFix campaigns evolve to use legitimate platforms for distribution
ClickFix campaigns have evolved to use legitimate platforms like Cloudflare Pages and Squarespace to host bogus installation instructions. The InstallFix variant of ClickFix tricks users into installing infostealer malware without needing additional pretexts. At least 20 distinct malware campaigns targeting AI and vibe coding tools have been identified, with nine affecting both Windows and macOS. The KongTuke TDS uses compromised WordPress websites and fake CAPTCHA lures to deliver the ModeloRAT trojan. ClickFix-style attacks have been used to distribute various malware families, including StealC Stealer, Vidar Stealer, Impure Stealer, and VodkaStealer. Apple’s Terminal security feature in macOS Tahoe 26.4 specifically targets the command execution stage of ClickFix attacks, reducing the risk of successful infections even when lures are hosted on legitimate platforms.
Show sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
22.12.2025 22:43 5 articles · 3mo ago
New MacSync variant bypasses macOS Gatekeeper checks
Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers. The campaigns use various lures, including OpenAI Atlas browser and ChatGPt conversations, to trick users into executing malicious commands. The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection. The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft. The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases. Apple’s Terminal warning system in macOS Tahoe 26.4 adds another layer of defense by disrupting the execution phase of ClickFix attacks, though the feature’s effectiveness depends on command analysis and user behavior.
Show sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
22.08.2025 18:44 3 articles · 7mo ago
Shamos infostealer targeting Mac devices via ClickFix attacks
Since June 2025, Shamos infostealer has attempted infections in over three hundred environments. The malware, developed by the COOKIE SPIDER group, steals data and credentials from web browsers, Keychain, Apple Notes, and cryptocurrency wallets. It is distributed through ClickFix attacks using malvertising and fake GitHub repositories. The malware uses anti-VM commands, AppleScript for reconnaissance, and creates persistence through a Plist file. Users are advised to avoid executing unknown commands and to seek help from trusted sources. Apple’s March 2026 macOS Tahoe 26.4 update introduces a Terminal security feature that blocks pasting and executing potentially harmful commands and warns users of risks, directly targeting ClickFix attack vectors used in Shamos and related campaigns.
Show sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
Information Snippets
-
Shamos is a variant of Atomic macOS Stealer (AMOS) developed by the COOKIE SPIDER group.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Shamos targets data and credentials stored in web browsers, Keychain items, Apple Notes, and cryptocurrency wallets.
First reported: 22.08.2025 18:441 source, 2 articlesShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
-
The malware is distributed through ClickFix attacks using malvertising and fake GitHub repositories.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Victims are prompted to execute shell commands in the macOS Terminal to download and install the malware.
First reported: 22.08.2025 18:441 source, 2 articlesShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
-
The malware uses Base64-encoded URLs to fetch a malicious Bash script that captures the user's password and executes the malware.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Shamos employs anti-VM commands for sandbox detection and AppleScript for host reconnaissance.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
The malware packages collected data into an archive named 'out.zip' and transmits it to the attacker.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Shamos creates a Plist file for persistence and can download additional payloads, including a spoofed Ledger Live wallet app and a botnet module.
First reported: 22.08.2025 18:441 source, 2 articlesShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
-
CrowdStrike detected over three hundred attempted infections since June 2025.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
The latest variant of the MacSync information stealer is delivered through a digitally signed, notarized Swift application.
First reported: 22.12.2025 22:432 sources, 2 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The malware is distributed via a disk image named zk-call-messenger-installer-3.9.2-lts.dmg, distributed via https://zkcall.net/download.
First reported: 22.12.2025 22:433 sources, 4 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The malware bypasses macOS Gatekeeper checks due to a valid signature associated with the Developer Team ID GNJLS3UYZ4.
First reported: 22.12.2025 22:433 sources, 3 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The malware uses evasion mechanisms such as inflating the DMG file with decoy PDFs, wiping execution scripts, and performing internet connectivity checks.
First reported: 22.12.2025 22:433 sources, 3 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The stealer can steal iCloud keychain credentials, browser passwords, system metadata, cryptocurrency wallet data, and files from the filesystem.
First reported: 22.12.2025 22:432 sources, 2 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The new MacSync Stealer variant is distributed as a Swift application that is both code-signed and notarized by Apple.
First reported: 23.12.2025 18:451 source, 1 articleShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The malware is distributed inside a disk image posing as a messaging app installer and requires no command-line involvement.
First reported: 23.12.2025 18:451 source, 1 articleShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The disk image is unusually large at 25.5MB, inflated with decoy files such as unrelated PDF documents.
First reported: 23.12.2025 18:451 source, 1 articleShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The malware performs several checks before executing its payload, including verifying internet connectivity, enforcing a minimum execution interval, and downloading the payload using a modified curl command.
First reported: 23.12.2025 18:452 sources, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The malware runs largely in memory and cleans up temporary files after execution, leaving minimal traces behind.
First reported: 23.12.2025 18:452 sources, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The associated developer certificate was reported to Apple and has since been revoked.
First reported: 23.12.2025 18:452 sources, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The new variant of MacSync stealer is delivered through a digitally signed, notarized Swift application masquerading as a messaging app installer.
First reported: 24.12.2025 18:231 source, 1 articleShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The disk image file named 'zk-call-messenger-installer-3.9.2-lts.dmg' is hosted on 'zkcall[.]net/download'.
First reported: 24.12.2025 18:231 source, 1 articleShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The installer displays instructions prompting users to right-click and open the app to sidestep Gatekeeper safeguards.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The Swift-based dropper performs a series of checks before downloading and executing an encoded script through a helper component.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The curl command used to retrieve the payload shows clear deviations from earlier variants, using flags like -fL and -sS, and additional options like --noproxy.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The DMG file is unusually large at 25.5 MB, inflated with unrelated PDF documents.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The Base64-encoded payload corresponds to MacSync, a rebranded version of Mac.c that first emerged in April 2025.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
MacSync comes fitted with a fully-featured Go-based agent that enables remote command and control capabilities.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The campaigns use various lures, including OpenAI Atlas browser and ChatGPT conversations, to trick users into executing malicious commands.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
ClickFix campaigns have evolved to use legitimate platforms like Cloudflare Pages and Squarespace to host bogus installation instructions.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The InstallFix variant of ClickFix tricks users into installing infostealer malware without needing additional pretexts.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
At least 20 distinct malware campaigns targeting AI and vibe coding tools have been identified, with nine affecting both Windows and macOS.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The KongTuke TDS uses compromised WordPress websites and fake CAPTCHA lures to deliver the ModeloRAT trojan.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
ClickFix-style attacks have been used to distribute various malware families, including StealC Stealer, Vidar Stealer, Impure Stealer, and VodkaStealer.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
Apple introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to possible risks.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The new macOS mechanism aims specifically to block ClickFix attacks and was reported by users during the release candidate phase.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
Apple did not mention the new Terminal warning in the official macOS Tahoe 26.4 release notes.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The warning system delays execution of pasted commands in Terminal and displays a message explaining the associated risks.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The alert informs users that no damage occurs if the command is halted and warns that scammers often distribute malicious instructions.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The warning system appears to analyze pasted commands and may not trigger for innocuous commands, with some users reporting it activates once per session.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The Terminal warning may not appear for all dangerous commands or in all scenarios, leaving some risk mitigation up to user discretion.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
Similar Happenings
Russian UNC6353 Uses Coruna and Darksword iOS Exploit Kits Across iOS 13–18.7 Targeting Financial Espionage and Data Theft
Apple has begun sending Lock Screen notifications to iPhones and iPads running outdated iOS versions warning users of active web-based exploits and urging immediate updates. This follows Apple’s support document alerting users to exploit kits like Coruna (targeting iOS 13–18.7) and Darksword (targeting iOS 18.4–18.7) and the public leak of a newer Darksword version on GitHub. Coruna and Darksword are now independently confirmed as closely related frameworks with shared origins in the 2019–2023 Operation Triangulation campaign, reinforcing attribution to Russian threat actor UNC6353 and associated groups. Coruna has evolved from a precision espionage tool into a mass-exploitation framework with 23 exploits across five chains, while Darksword is now publicly leaked and targets iOS 18.7. Apple has patched all exploited flaws in recent releases (18.7.3, 26.2, 26.3.1), and CISA has mandated federal agencies patch three DarkSword-linked vulnerabilities (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520) by April 3, 2026. Campaigns linked to UNC6353, UNC6748, and Turkish vendor PARS Defense highlight the growing commoditization of iOS exploitation tools and elevated risk to end-users globally.
Infostealer Malware Targets OpenClaw Configuration Files
Infostealer malware has been observed stealing OpenClaw configuration files containing API keys, authentication tokens, and other sensitive secrets. This marks the first known instance of such attacks targeting the popular AI assistant framework. The stolen data includes configuration details, authentication tokens, and persistent memory files, which could enable full compromise of the victim's digital identity. The malware, identified as a variant of the Vidar infostealer, executed a broad file-stealing routine that scanned for sensitive keywords. Researchers predict increased targeting of OpenClaw as it becomes more integrated into professional workflows. Additionally, security issues with OpenClaw have prompted the maintainers to partner with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.
Android Malware Campaign Abuses Hugging Face Platform
A new Android malware campaign leverages the Hugging Face platform to distribute thousands of variants of an APK payload designed to steal credentials from popular financial and payment services. The attack begins with a dropper app called TrustBastion, which uses scareware-style ads to lure victims into installing it. The malware then redirects to a Hugging Face repository to download the final payload, using server-side polymorphism to evade detection. The malware exploits Android’s Accessibility Services to capture screenshots, monitor user activity, and steal credentials. The campaign was discovered by Bitdefender researchers, who found over 6,000 commits in the repository. The repository was taken down but resurfaced under a new name, 'Premium Club,' with the same malicious code. Bitdefender has published indicators of compromise and informed Hugging Face, which removed the malicious datasets. The infection chain begins when users download the malicious Android app TrustBastion, which appears as scareware via popups claiming the device is infected with malware. The dropper app prompts users to run an update that mimics legitimate Google Play and Android system update dialog boxes. The dropper contacts an encrypted endpoint hosted at trustbastion[.]com, which returns an HTML file containing a redirect link to the Hugging Face repository hosting the malware. The malware masquerades as a 'Phone Security' feature to guide users through enabling Accessibility Services. The malware requests permissions for screen recording, screen casting, and overlay display to monitor all user activity and capture screen content. The malware captures lockscreen information for security verification of financial and payment services.
Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace
A malicious GitHub campaign, tracked as **"TroyDen's Lure Factory"**, is distributing over **300 Trojanized packages**, including a fake **OpenClaw Docker deployer**, to deliver a LuaJIT-based data-stealing Trojan. The campaign targets developers, gamers, and the general public with lures ranging from AI tools to game cheats, exploiting automated analysis gaps by splitting the payload into two components—a renamed Lua runtime and an encrypted script—that evade detection when analyzed separately. Once executed, the Trojan captures screenshots, performs geolocation, and exfiltrates credentials to a Frankfurt-based C2 server, with a **29,000-year sleep delay** to defeat sandboxes. GitHub was notified on **March 20, 2026**, but at least two lure repositories remain active. This follows a pattern of **supply-chain and social engineering attacks** leveraging OpenClaw’s popularity, including prior incidents like the **Cline npm compromise** (February 2026), **malicious ClawHub skills** pushing info-stealers, and **exposed OpenClaw instances** (40,000+ vulnerable deployments globally). Chinese authorities have restricted OpenClaw usage in state-run enterprises due to its **privileged system access and prompt injection risks**, while threat actors continue to distribute **fake installers** (e.g., Atomic Stealer, Vidar, GhostSocks proxy malware). Users are urged to **verify repository authenticity, isolate AI tools, and audit environments** for unexpected OpenClaw installations.
ErrTraffic Service Enables Automated ClickFix Attacks via Fake Browser Glitches
A new cybercrime tool called ErrTraffic automates ClickFix attacks by generating fake browser glitches on compromised websites to trick users into downloading malware or following malicious instructions. The service promises high conversion rates and delivers architecture-specific payloads. ClickFix attacks have gained popularity among cybercriminals and state-sponsored actors for bypassing security controls. ErrTraffic is sold for a one-time purchase of $800 and offers a user-friendly panel for campaign management. It modifies the DOM of compromised websites to display visual glitches, prompting victims to execute malicious commands. Payloads include Lumma and Vidar info-stealers on Windows, Cerberus trojan on Android, AMOS stealer on macOS, and unspecified Linux backdoors.