Kaspersky Discovers Infostealer Campaign Targeting macOS Users

Published:

spot_img

Growing Malware Threats Target Mac Users Through Deceptive Campaigns

Kaspersky’s Discovery of a New Malware Scheme

Kaspersky Threat Research has uncovered a concerning new malware campaign specifically targeting Mac users. This scheme cleverly uses paid Google search advertisements and discussions from the official ChatGPT website to deceive users into executing a command line that installs a powerful infostealer known as AMOS (Atomic macOS Stealer) along with a persistent backdoor on their systems.

How the Attackers Operate

The attackers strategically purchase sponsored search ads for terms like “chatgpt atlas” to lure unsuspecting users to a seemingly legitimate installation guide for something called “ChatGPT Atlas for macOS.” This guide, however, is a mirage—it directs users to a sanitized shared ChatGPT conversation. The only content remaining are the alleged step-by-step installation instructions.

In a deceptive twist, users are prompted to copy a single line of code, open the Terminal application on their Macs, and paste this command. From there, they are encouraged to grant all requested permissions without understanding what the command is truly doing.

The Execution of the Malicious Command

Kaspersky’s research reveals that the command downloads and executes a script hosted on an external site, atlas-extension[.]com. This script repeatedly requests the user’s system password, validating it against system commands. Once the correct password is input, the script brings down the AMOS infostealer, which then activates and begins its malicious activities. This attack strategy aligns with a technique known as ClickFix, where users unwittingly execute shell commands that fetch and run external code.

Data Collection and Exfiltration

Once AMOS is installed, it embarks on an extensive data collection mission. This malware targets sensitive information—passwords, cookies, and data from popular browsers, as well as cryptocurrency wallet details from applications like Electrum, Coinomi, and Exodus. Furthermore, it seeks out files with TXT, PDF, and DOCX extensions located in common directories such as Desktop, Documents, and Downloads, along with information stored in the Notes application. The gathered data is then sent to servers controlled by the attackers. Concurrently, a backdoor is established, allowing the attackers remote access and enabling the malware to automatically start on reboot.

A Broader Trend in Cyber Threats

This incident underscores a troubling trend: infostealers are rapidly becoming one of the most significant threats in 2025. Cybercriminals are increasingly leveraging AI-related themes, creating fake AI tools, and generating AI content to make their schemes appear more legitimate. This particular attack fits into a larger pattern where attackers exploit popular, reputable platforms and their legitimate features to further their malicious agendas.

Expert Insights on the Effectiveness of the Attack

Vladimir Gursky, a Malware Analyst at Kaspersky, notes that the effectiveness of this campaign does not stem from complex technical exploits. Instead, it lies in how the attackers utilize social engineering within a familiar AI context. The combination of a sponsored link leading to a well-designed page on a trusted domain, accompanied by a deceptively simple “installation guide,” leads many users to lower their guards. This risky blend of trust and simplicity can result in a full system compromise and long-standing access for attackers.

Recommendations for Users

In light of this growing threat, experts recommend that users exercise caution:

  • Be Skeptical of Unsolicited Guides: Any guide that instructs you to run Terminal or PowerShell commands, especially if it includes copying and pasting site scripts, should be treated with suspicion.
  • Seek Clarification: If you encounter unclear instructions, close those web pages or delete the messages and consult with a knowledgeable person before acting.
  • Use AI or Security Tools for Verification: Consider pasting suspicious commands into reputable AI platforms or security tools to analyze what the code does before executing it.
  • Install Trusted Security Software: Protect all devices, including macOS and Linux systems, by installing reputable security solutions like Kaspersky Premium, which are equipped to identify and obstruct infostealers and associated threats.

Staying vigilant and informed is critical in today’s evolving cybersecurity landscape.

spot_img

Related articles

Recent articles

NIST Unveils Draft Guidance on Cybersecurity Risks of AI Adoption in Enterprises

Understanding the Cyber AI Profile: Guidelines for AI and Cybersecurity Introduction to Cyber AI Integration The rapid integration of artificial intelligence (AI) technologies within enterprise environments...

Cybercrime in 2026: The Impact of Wearables and Deepfakes

The Threat Landscape of Wearable Technology: A New Era of Cybersecurity Risks The Accumulation of Personal Data Smartwatches, fitness rings, AI-powered wearables, and sensor-rich mattresses are...

SoundCloud Confirms Cyber Incident: Is ShinyHunters Responsible?

SoundCloud Confirms Cyber Incident Amid Service Interruptions Overview of the Incident In recent days, users of SoundCloud, the popular music and audio streaming platform, experienced significant...

Fortinet Strengthens AI Cybersecurity and Public-Private Partnerships to Combat Growing Threats

Navigating the Evolving Landscape of Identity-Based Cyber Threats In an era where the digital domain is increasingly vulnerable, the nature of cyber attacks has transformed...