Shamos Infostealer Targeting Mac Devices via ClickFix Attacks
Summary
Hide ▲
Show ▼
Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns used malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms, while also leveraging Terminal-based ClickFix tactics and obfuscated payloads. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 to disrupt ClickFix attack chains by blocking pasted command execution and warning users of risks. A major evolution emerged in April 2026 when Jamf researchers observed attackers abusing the built-in Script Editor application to bypass these protections using fake Apple-themed disk cleanup guides and malicious applescript:// URL scheme execution. The Script Editor-based ClickFix variation enabled theft of Keychain data, browser autofill, cryptocurrency wallet extensions, and system details without Terminal interaction, and introduced a backdoor component for persistent access. Most recently, SentinelOne has identified a new SHub macOS infostealer variant, dubbed Reaper, which further refines the Script Editor-based ClickFix attack vector. Reaper uses a fake Apple security update message displayed via the applescript:// URL scheme to launch Script Editor with a malicious AppleScript payload dynamically constructed and hidden under ASCII art. The malware bypasses Apple’s Terminal mitigations, performs device fingerprinting to evade sandboxes, and targets extensive data across browsers, wallets, password managers, iCloud, Telegram, and developer files. It includes a Filegrabber module for collecting sensitive documents and a wallet hijacking mechanism that replaces legitimate application files with malicious payloads. Reaper establishes persistence via a Google software update impersonation script registered as a LaunchAgent, enabling periodic beaconing to the C2 server and remote payload execution. Notably, the malware includes geofencing to avoid infecting Russian systems and represents an escalation in capabilities, incorporating remote access functionality to allow additional malware deployment on compromised macOS devices.
Timeline
-
16.03.2026 13:41 2 articles · 2mo ago
ClickFix campaigns evolve to use legitimate platforms for distribution
ClickFix campaigns have evolved to use legitimate platforms like Cloudflare Pages and Squarespace to host bogus installation instructions. The InstallFix variant of ClickFix tricks users into installing infostealer malware without needing additional pretexts. At least 20 distinct malware campaigns targeting AI and vibe coding tools have been identified, with nine affecting both Windows and macOS. The KongTuke TDS uses compromised WordPress websites and fake CAPTCHA lures to deliver the ModeloRAT trojan. ClickFix-style attacks have been used to distribute various malware families, including StealC Stealer, Vidar Stealer, Impure Stealer, and VodkaStealer. Apple’s Terminal security feature in macOS Tahoe 26.4 specifically targets the command execution stage of ClickFix attacks, reducing the risk of successful infections even when lures are hosted on legitimate platforms.
Show sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
22.12.2025 22:43 8 articles · 4mo ago
New MacSync variant bypasses macOS Gatekeeper checks
Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers. The campaigns use various lures, including OpenAI Atlas browser and ChatGPt conversations, to trick users into executing malicious commands. The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection. The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft. The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases. Apple’s Terminal warning system in macOS Tahoe 26.4 adds another layer of defense by disrupting the execution phase of ClickFix attacks, though the feature’s effectiveness depends on command analysis and user behavior. A new April 2026 campaign observed by Jamf researchers demonstrates attackers abusing the built-in Script Editor application to bypass Terminal protections. The campaign uses fake Apple-themed disk cleanup guides to prompt victims to launch Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer (AMOS). The Script Editor variation does not require manual Terminal interaction, marking a significant evolution in ClickFix attack tactics. The current article provides additional technical detail on the Script Editor-based ClickFix attack flow and confirms its role in delivering AMOS while evading Terminal warnings. This update also documents the SHub Reaper variant’s use of the same Script Editor-based ClickFix vector, leveraging fake security update lures to deliver a backdoor-enabled infostealer with expanded data theft, file grabbing, wallet hijacking, and persistence mechanisms.
Show sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
22.08.2025 18:44 6 articles · 9mo ago
Shamos infostealer targeting Mac devices via ClickFix attacks
Since June 2025, Shamos infostealer has attempted infections in over three hundred environments. The malware, developed by the COOKIE SPIDER group, steals data and credentials from web browsers, Keychain, Apple Notes, and cryptocurrency wallets. It is distributed through ClickFix attacks using malvertising and fake GitHub repositories. The malware uses anti-VM commands, AppleScript for reconnaissance, and creates persistence through a Plist file. Apple’s March 2026 macOS Tahoe 26.4 update introduces a Terminal security feature that blocks pasting and executing potentially harmful commands and warns users of risks, directly targeting ClickFix attack vectors used in Shamos and related campaigns. A new April 2026 campaign observed by Jamf researchers demonstrates attackers abusing the built-in Script Editor application to bypass Terminal protections. The campaign uses fake Apple-themed disk cleanup guides to prompt victims to launch Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer (AMOS). The Script Editor variation does not require manual Terminal interaction, marking a significant evolution in ClickFix attack tactics. The current article confirms the Script Editor-based ClickFix variation identified on April 8, 2026, and details its use of browser-triggered workflows to launch Script Editor and evade Terminal warnings. Additionally, it clarifies that SHub’s Reaper variant continues to exploit this Script Editor-based ClickFix vector to bypass Terminal mitigations and deliver infostealer payloads with expanded capabilities including backdoor access and geofencing to avoid infecting Russian-language systems.
Show sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
Information Snippets
-
Shamos is a variant of Atomic macOS Stealer (AMOS) developed by the COOKIE SPIDER group.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Shamos targets data and credentials stored in web browsers, Keychain items, Apple Notes, and cryptocurrency wallets.
First reported: 22.08.2025 18:441 source, 2 articlesShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
-
The malware is distributed through ClickFix attacks using malvertising and fake GitHub repositories.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Victims are prompted to execute shell commands in the macOS Terminal to download and install the malware.
First reported: 22.08.2025 18:441 source, 2 articlesShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
-
The malware uses Base64-encoded URLs to fetch a malicious Bash script that captures the user's password and executes the malware.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Shamos employs anti-VM commands for sandbox detection and AppleScript for host reconnaissance.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
The malware packages collected data into an archive named 'out.zip' and transmits it to the attacker.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
Shamos creates a Plist file for persistence and can download additional payloads, including a spoofed Ledger Live wallet app and a botnet module.
First reported: 22.08.2025 18:441 source, 2 articlesShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
-
CrowdStrike detected over three hundred attempted infections since June 2025.
First reported: 22.08.2025 18:441 source, 1 articleShow sources
- Fake Mac fixes trick users into installing new Shamos infostealer — www.bleepingcomputer.com — 22.08.2025 18:44
-
The latest variant of the MacSync information stealer is delivered through a digitally signed, notarized Swift application.
First reported: 22.12.2025 22:432 sources, 2 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The malware is distributed via a disk image named zk-call-messenger-installer-3.9.2-lts.dmg, distributed via https://zkcall.net/download.
First reported: 22.12.2025 22:433 sources, 4 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The malware bypasses macOS Gatekeeper checks due to a valid signature associated with the Developer Team ID GNJLS3UYZ4.
First reported: 22.12.2025 22:433 sources, 3 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The malware uses evasion mechanisms such as inflating the DMG file with decoy PDFs, wiping execution scripts, and performing internet connectivity checks.
First reported: 22.12.2025 22:433 sources, 3 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The stealer can steal iCloud keychain credentials, browser passwords, system metadata, cryptocurrency wallet data, and files from the filesystem.
First reported: 22.12.2025 22:432 sources, 2 articlesShow sources
- New MacSync malware dropper evades macOS Gatekeeper checks — www.bleepingcomputer.com — 22.12.2025 22:43
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The new MacSync Stealer variant is distributed as a Swift application that is both code-signed and notarized by Apple.
First reported: 23.12.2025 18:451 source, 1 articleShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The malware is distributed inside a disk image posing as a messaging app installer and requires no command-line involvement.
First reported: 23.12.2025 18:451 source, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
-
The disk image is unusually large at 25.5MB, inflated with decoy files such as unrelated PDF documents.
First reported: 23.12.2025 18:451 source, 1 articleShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
-
The malware performs several checks before executing its payload, including verifying internet connectivity, enforcing a minimum execution interval, and downloading the payload using a modified curl command.
First reported: 23.12.2025 18:452 sources, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The malware runs largely in memory and cleans up temporary files after execution, leaving minimal traces behind.
First reported: 23.12.2025 18:452 sources, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The associated developer certificate was reported to Apple and has since been revoked.
First reported: 23.12.2025 18:452 sources, 2 articlesShow sources
- Reworked MacSync Stealer Adopts Quieter Installation Process — www.infosecurity-magazine.com — 23.12.2025 18:45
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The new variant of MacSync stealer is delivered through a digitally signed, notarized Swift application masquerading as a messaging app installer.
First reported: 24.12.2025 18:231 source, 1 articleShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The disk image file named 'zk-call-messenger-installer-3.9.2-lts.dmg' is hosted on 'zkcall[.]net/download'.
First reported: 24.12.2025 18:231 source, 1 articleShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
-
The installer displays instructions prompting users to right-click and open the app to sidestep Gatekeeper safeguards.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The Swift-based dropper performs a series of checks before downloading and executing an encoded script through a helper component.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The curl command used to retrieve the payload shows clear deviations from earlier variants, using flags like -fL and -sS, and additional options like --noproxy.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The DMG file is unusually large at 25.5 MB, inflated with unrelated PDF documents.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The Base64-encoded payload corresponds to MacSync, a rebranded version of Mac.c that first emerged in April 2025.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
MacSync comes fitted with a fully-featured Go-based agent that enables remote command and control capabilities.
First reported: 24.12.2025 18:231 source, 2 articlesShow sources
- New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper — thehackernews.com — 24.12.2025 18:23
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
Three distinct ClickFix campaigns have been identified distributing the MacSync infostealer via fake AI tool installers.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The campaigns use various lures, including OpenAI Atlas browser and ChatGPT conversations, to trick users into executing malicious commands.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The latest variant of MacSync supports dynamic AppleScript payloads and in-memory execution to evade detection.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The shell script retrieves the AppleScript infostealer payload from a hard-coded server and removes evidence of data theft.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The malware harvests credentials, files, keychain databases, and cryptocurrency wallet seed phrases.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
ClickFix campaigns have evolved to use legitimate platforms like Cloudflare Pages and Squarespace to host bogus installation instructions.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The InstallFix variant of ClickFix tricks users into installing infostealer malware without needing additional pretexts.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
At least 20 distinct malware campaigns targeting AI and vibe coding tools have been identified, with nine affecting both Windows and macOS.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
The KongTuke TDS uses compromised WordPress websites and fake CAPTCHA lures to deliver the ModeloRAT trojan.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
ClickFix-style attacks have been used to distribute various malware families, including StealC Stealer, Vidar Stealer, Impure Stealer, and VodkaStealer.
First reported: 16.03.2026 13:411 source, 1 articleShow sources
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers — thehackernews.com — 16.03.2026 13:41
-
Apple introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to possible risks.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The new macOS mechanism aims specifically to block ClickFix attacks and was reported by users during the release candidate phase.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
Apple did not mention the new Terminal warning in the official macOS Tahoe 26.4 release notes.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The warning system delays execution of pasted commands in Terminal and displays a message explaining the associated risks.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The alert informs users that no damage occurs if the command is halted and warns that scammers often distribute malicious instructions.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The warning system appears to analyze pasted commands and may not trigger for innocuous commands, with some users reporting it activates once per session.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
The Terminal warning may not appear for all dangerous commands or in all scenarios, leaving some risk mitigation up to user discretion.
First reported: 30.03.2026 17:321 source, 1 articleShow sources
- Apple adds macOS Terminal warning to block ClickFix attacks — www.bleepingcomputer.com — 30.03.2026 17:32
-
A new campaign delivering Atomic Stealer (AMOS) to macOS users abuses the Script Editor application in a ClickFix attack variation that does not require manual Terminal command execution.
First reported: 08.04.2026 21:551 source, 2 articlesShow sources
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The campaign uses fake Apple-themed disk cleanup guides to prompt victims to launch Script Editor via the applescript:// URL scheme, pre-filling malicious executable code.
First reported: 08.04.2026 21:552 sources, 3 articlesShow sources
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The Script Editor exploit runs an obfuscated 'curl | zsh' command to download and execute a script in system memory, decoding a base64 + gzip payload.
First reported: 08.04.2026 21:552 sources, 3 articlesShow sources
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The final payload is an AMOS Mach-O binary that harvests Keychain data, desktop files, browser cryptocurrency wallet extensions, autofill data, passwords, cookies, stored credit cards, and system information.
First reported: 08.04.2026 21:551 source, 2 articlesShow sources
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
Atomic Stealer (AMOS) has added a backdoor component enabling persistent access to compromised macOS systems.
First reported: 08.04.2026 21:552 sources, 3 articlesShow sources
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
Jamf researchers observed the current campaign distributing Atomic Stealer via Script Editor-based ClickFix attacks.
First reported: 08.04.2026 21:552 sources, 3 articlesShow sources
- New macOS stealer campaign uses Script Editor in ClickFix attack — www.bleepingcomputer.com — 08.04.2026 21:55
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
Atomic Stealer (AMOS) is delivered via a browser-triggered workflow that launches Script Editor, where victims are encouraged to enter malicious commands through fake Apple-themed disk cleanup guides.
First reported: 09.04.2026 14:202 sources, 2 articlesShow sources
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The malware campaign was identified by Jamf Threat Labs researchers on April 8, 2026, and uses a browser-based window posing as an official Apple message to trick users into executing commands in Script Editor.
First reported: 09.04.2026 14:202 sources, 2 articlesShow sources
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The shift to Script Editor execution allows attackers to bypass Apple's Terminal security warnings introduced in macOS Tahoe 26.4, maintaining a familiar delivery mechanism while changing how and where commands execute.
First reported: 09.04.2026 14:202 sources, 2 articlesShow sources
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings — www.infosecurity-magazine.com — 09.04.2026 14:20
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
A new SHub macOS infostealer variant, dubbed Reaper, uses AppleScript to display a fake Apple security update message via applescript:// URL scheme and installs a backdoor.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The Reaper variant bypasses Apple’s Terminal security warnings introduced in macOS Tahoe 26.4 by leveraging Script Editor execution instead of manual Terminal commands.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The malware is delivered through fake installers for WeChat and Miro hosted on spoofed domains (e.g., qq-0732gwh22[.]com, mlcrosoft[.]co[.]com, mlroweb[.]com), with the Miro domain redirecting to the legitimate site.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
Reaper performs device fingerprinting to detect sandboxes or VPNs and enumerates browser extensions for password managers and cryptocurrency wallets, sending telemetry via a Telegram bot.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The malicious AppleScript payload is dynamically constructed and hidden under ASCII art, displaying a fake Apple security update referencing XProtectRemediator before executing a shell script via curl and zsh.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The malware includes a geofencing mechanism that exits without infecting Russian-language systems, reporting a 'cis_blocked' event to the C2 server.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
Reaper steals data from browsers (Chrome, Firefox, Brave, Edge, Opera, Vivaldi, Arc, Orion), cryptocurrency wallet extensions (MetaMask, Phantom), password managers (1Password, Bitwarden, LastPass), desktop wallets (Exodus, Atomic Wallet, Ledger Live, Electrum, Trezor Suite), iCloud account data, and Telegram sessions.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
The Filegrabber module targets desktop and documents folders for files under 2MB (or up to 6MB for PNGs), with a 150MB total volume limit, and hijacks wallet applications by replacing core files with malicious app.asar payloads.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
Persistence is established via a script impersonating Google software update, registered as a LaunchAgent executing every minute to beacon system information to the C2 server and enable remote payload execution.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
-
SHub operators are expanding the infostealer's capabilities to include remote access to compromised devices, allowing additional malware deployment.
First reported: 19.05.2026 00:421 source, 1 articleShow sources
- SHub macOS infostealer variant spoofs Apple security updates — www.bleepingcomputer.com — 19.05.2026 00:42
Similar Happenings
Living-Off-the-Land (LOTL) abuse of native utilities expands to macOS as primary intrusion tactic in enterprise environments
Threat actors are increasingly leveraging legitimate, native system tools across both Windows and macOS environments to conduct attacks, achieving lateral movement, privilege escalation, and persistence while evading detection. Analysis of over 700,000 high-severity incidents indicates that 84% now involve abuse of trusted utilities—practices known as Living off the Land (LOTL). This shift reduces reliance on malware and exploits, exploiting operational blind spots created by necessary administrative tools. Recent research from Cisco Talos highlights the expansion of LOTL techniques to macOS native features such as Remote Application Scripting (RAS), Spotlight metadata, and Apple Events, enabling covert execution, persistence, and lateral movement. More than 45% of organizations now use macOS in enterprise settings—often holding sensitive credentials, cloud access, and source code—making the platform a high-value target. Attackers abuse RAS to issue remote commands without triggering shell-based monitoring, embed malicious payloads in Finder comments stored as Spotlight metadata, and leverage protocols like SMB, Netcat, Git repositories, TFTP, and SNMP for covert data transfer and movement. The technique remains the dominant intrusion vector, progressing undetected until significant compromise occurs, particularly due to limited visibility into macOS-native behaviors and reliance on legitimate system processes.
Venom Stealer infostealer kit introduces continuous credential harvesting via malware-as-a-service model
A newly identified infostealer malware kit named Venom Stealer is offered as a malware-as-a-service (MaaS) subscription priced at $250 per month or $1,800 lifetime, enabling continuous credential harvesting and wallet cracking operations. The kit targets Windows and macOS systems via deceptive social engineering lures integrated into its operator panel, including fake Cloudflare CAPTCHA pages, OS update prompts, SSL certificate errors, and font installation pages. Victims are tricked into executing commands via Run dialog or Terminal, bypassing detection systems by appearing user-initiated. Upon execution, it extracts and exfiltrates browser credentials, session cookies, browsing history, autofill data, cryptocurrency wallet vaults, browser extension data, and system fingerprints from Chromium and Firefox browsers. Venom Stealer distinguishes itself by maintaining silent persistence through a background session listener that reports new credentials and wallet activity to command-and-control infrastructure twice daily, and by continuously monitoring Chrome's login database to capture newly saved credentials in real time. Exfiltrated cryptocurrency wallet data is processed by a server-side GPU cracking engine, with funds automatically transferred across multiple blockchain networks including tokens and DeFi positions, undermining password rotation and incident response efforts.
Infinity Stealer macOS infostealer delivered via ClickFix CAPTCHA lures
A new macOS-targeting infostealer named Infinity Stealer is being distributed via ClickFix CAPTCHA lures impersonating Cloudflare’s human verification, leading victims to execute a base64-obfuscated Bash command that fetches and runs a Nuitka-compiled Python payload. The attack abuses a fake CAPTCHA on update-check[.]com to bypass OS defenses and install a Mach-O loader that extracts a zstd-compressed archive containing the stealer. Infinity Stealer harvests browser credentials, macOS Keychain entries, cryptocurrency wallets, and plaintext secrets from developer files, and exfiltrates data via HTTP POST to C2 with Telegram notifications to operators.
InstallFix Campaign Expands to macOS via Google Ads and Abused Claude.ai Chats
Threat actors are expanding the InstallFix social engineering technique to abuse Google Ads and legitimate Claude.ai shared chats to distribute macOS malware. The attackers create weaponized installation guides embedded in publicly accessible Claude chats, tricking users into executing malicious commands that download and execute infostealers such as MacSync and in-memory loader scripts. The campaigns target macOS users searching for 'Claude mac download' via malvertising on Google Ads, using Anthropic's real claude.ai domain in sponsored search results. The malware variants harvest browser credentials, cookies, and macOS Keychain contents while evading detection through in-memory execution and selective victim profiling.
Russian UNC6353 Uses Coruna and Darksword iOS Exploit Kits Across iOS 13–18.7 Targeting Financial Espionage and Data Theft
Apple has expanded security updates for iOS 18.7.7 and iPadOS 18.7.7 to protect devices still running iOS 18 from the DarkSword exploit kit, without requiring full OS upgrades. This follows continued exploitation of DarkSword since July 2025 across multiple countries, with attacks leveraging six vulnerabilities to deploy data-stealing malware like GhostBlade, GhostKnife, and GhostSaber through watering hole attacks on compromised websites. The campaign remains linked to Russian threat actor UNC6353 and associated groups including UNC6748 and Turkish vendor PARS Defense, with Coruna and Darksword exploit kits now confirmed as closely related frameworks sharing origins in the 2019–2023 Operation Triangulation campaign. Coruna has evolved from a precision espionage tool into a mass-exploitation framework with 23 exploits across five chains, while Darksword targets iOS 18.4–18.7 and has been publicly leaked on GitHub. Apple has patched all exploited flaws in recent releases (18.7.3, 26.2, 26.3.1), and CISA has mandated federal agencies patch three DarkSword-linked vulnerabilities (CVE-2025-31277, CVE-2025-43510, CVE-2025-43520) by April 3, 2026. The commoditization of these iOS exploitation tools elevates risk to end-users globally.