Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Alibaba’s Qwen Built-in into Hongqi Good Cockpit for In-Automobile AI Providers

March 29, 2026

Ajman Transport steps up security measures amid antagonistic climate situations

March 29, 2026

This Week’s Sky at a Look, March 27 – April 5

March 29, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Alibaba’s Qwen Built-in into Hongqi Good Cockpit for In-Automobile AI Providers
  • Ajman Transport steps up security measures amid antagonistic climate situations
  • This Week’s Sky at a Look, March 27 – April 5
  • Elon Musk’s final co-founder reportedly leaves xAI
  • Why GameStop Put $315 Million in Bitcoin Right into a Coated Name Choices Technique
  • Why Correct AI Predictions Nonetheless Fail in Actual Markets: A Korea Case – KoreaTechDesk
  • Scientists uncovered the vitamins bees have been lacking — Colonies surged 15-fold
  • YouTube monetization replace: What creators must know as ‘AI slop’ overwhelms the platform
Sunday, March 29
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - New Atomic macOS Stealer Marketing campaign Exploits ClickFix to Goal Apple Customers
Cybersecurity & Digital Rights

New Atomic macOS Stealer Marketing campaign Exploits ClickFix to Goal Apple Customers

NextTechBy NextTechJune 7, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
New Atomic macOS Stealer Marketing campaign Exploits ClickFix to Goal Apple Customers
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity researchers are alerting to a brand new malware marketing campaign that employs the ClickFix social engineering tactic to trick customers into downloading an data stealer malware often called Atomic macOS Stealer (AMOS) on Apple macOS methods.

The marketing campaign, based on CloudSEK, has been discovered to leverage typosquat domains mimicking U.S.-based telecom supplier Spectrum.

“macOS customers are served a malicious shell script designed to steal system passwords and obtain an AMOS variant for additional exploitation,” safety researcher Koushik Pal mentioned in a report revealed this week. “The script makes use of native macOS instructions to reap credentials, bypass safety mechanisms, and execute malicious binaries.”

It is believed that the exercise is the work of Russian-speaking cybercriminals owing to the presence of Russian language feedback within the malware’s supply code.

Cybersecurity

The place to begin of the assault is an internet web page that impersonates Spectrum (“panel-spectrum[.]web” or “spectrum-ticket[.]web”). Guests to the websites in query are served a message that instructs them to finish a hCaptcha verification test to so as to “assessment the safety” of their connection earlier than continuing additional.

Nevertheless, when the consumer clicks the “I’m human” checkbox for analysis, they’re displayed an error message stating “CAPTCHA verification failed,” urging them to click on a button to go forward with an “Different Verification.”

Doing so causes a command to be copied to the customers’ clipboard and the sufferer is proven a set of directions relying on their working system. Whereas they’re guided to run a PowerShell command on Home windows by opening the Home windows Run dialog, it is substituted by a shell script that is executed by launching the Terminal app on macOS.

The shell script, for its half, prompts customers to enter their system password and downloads a next-stage payload, on this case, a identified stealer referred to as Atomic Stealer.

“Poorly applied logic within the supply websites, reminiscent of mismatched directions throughout platforms, factors to swiftly assembled infrastructure,” Pal mentioned.

“The supply pages in query for this AMOS variant marketing campaign contained inaccuracies in each its programming and front-end logic. For Linux consumer brokers, a PowerShell command was copied. Moreover, the instruction ‘Press & maintain the Home windows Key + R’ was exhibited to each Home windows and Mac customers.”

The disclosure comes amid a surge in campaigns utilizing the ClickFix tactic to ship a variety of malware households over the previous yr.

“Actors finishing up these focused assaults usually make the most of comparable methods, instruments, and procedures (TTPs) to achieve preliminary entry,” Darktrace mentioned. “These embody spear phishing assaults, drive-by compromises, or exploiting belief in acquainted on-line platforms, reminiscent of GitHub, to ship malicious payloads.”

attack

The hyperlinks distributed utilizing these vectors usually redirect the top consumer to a malicious URL that shows a faux CAPTCHA verification test and completes it in an try to deceive customers into pondering that they’re finishing up one thing innocuous, when, in actuality, they’re guided to execute malicious instructions to repair a non-existent situation.

The top results of this efficient social engineering technique is that customers find yourself compromising their very own methods, successfully bypassing safety controls.

In a single April 2025 incident analyzed by Darktrace, unknown menace actors have been discovered to make the most of ClickFix as an assault vector to obtain nondescript payloads to burrow deeper into the goal surroundings, conduct lateral motion, ship system-related data to an exterior server through an HTTP POST request, and finally exfiltrate information.

“ClickFix baiting is a extensively used tactic wherein menace actors exploit human error to bypass safety defenses,” Darktrace mentioned. “By tricking endpoint customers into performing seemingly innocent, on a regular basis actions, attackers achieve preliminary entry to methods the place they will entry and exfiltrate delicate information.”

Cybersecurity

Different ClickFix assaults have employed phony variations of different well-liked CAPTCHA providers like Google reCAPTCHA and Cloudflare Turnstile for malware supply underneath the guise of routine safety checks.

These faux pages are “pixel-perfect copies” of their professional counterparts, generally even injected into real-but-hacked web sites to trick unsuspecting customers. Stealers reminiscent of Lumma and StealC, in addition to full-fledged distant entry trojans (RATs) like NetSupport RAT are among the payloads distributed through bogus Turnstile pages.

“Trendy web customers are inundated with spam checks, CAPTCHAs, and safety prompts on web sites, they usually’ve been conditioned to click on by way of these as rapidly as potential,” SlashNext’s Daniel Kelley mentioned. “Attackers exploit this ‘verification fatigue,’ figuring out that many customers will adjust to no matter steps are introduced if it seems routine.”

Discovered this text fascinating? This text is a contributed piece from one in all our valued companions. Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Citrix NetScaler Beneath Lively Recon for CVE-2026-3055 (CVSS 9.3) Reminiscence Overread Bug

March 29, 2026

RSAC 2026 wrap-up – Week in safety with Tony Anscombe

March 28, 2026

LangChain, LangGraph Flaws Expose Recordsdata, Secrets and techniques, Databases in Broadly Used AI Frameworks

March 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Alibaba’s Qwen Built-in into Hongqi Good Cockpit for In-Automobile AI Providers

By NextTechMarch 29, 2026

Alibaba’s Qwen AI assistant has been built-in into the good cockpit of Hongqi automobiles, debuting…

Ajman Transport steps up security measures amid antagonistic climate situations

March 29, 2026

This Week’s Sky at a Look, March 27 – April 5

March 29, 2026
Top Trending

Alibaba’s Qwen Built-in into Hongqi Good Cockpit for In-Automobile AI Providers

By NextTechMarch 29, 2026

Alibaba’s Qwen AI assistant has been built-in into the good cockpit of…

Ajman Transport steps up security measures amid antagonistic climate situations

By NextTechMarch 29, 2026

Picture Credit score : WAM The Ajman Transport Authority has intensified its…

This Week’s Sky at a Look, March 27 – April 5

By NextTechMarch 29, 2026

FRIDAY, MARCH 27 ■ Cassiopeia, that signature fall-and-winter constellation of the northern…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!