๐จ ๐บ๐ฎ๐ฐ๐ข๐ฆ-๐ฆ๐ฝ๐ฒ๐ฐ๐ถ๐ณ๐ถ๐ฐ #๐๐น๐ถ๐ฐ๐ธ๐๐ถ๐
๐๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป ๐ง๐ฎ๐ฟ๐ด๐ฒ๐๐ถ๐ป๐ด ๐๐น๐ฎ๐๐ฑ๐ฒ ๐๐ผ๐ฑ๐ฒ ๐จ๐๐ฒ๐ฟ๐: ๐๐ฒ๐๐ฒ๐ฐ๐ ๐๐ ๐๐ฎ๐ฟ๐น๐
โ ๏ธ We identified a campaign targeting users of AI platforms such as Claude Code, Grok, n8n, NotebookLM, Gemini CLI, OpenClaw, and Cursor with AMOS Stealer. As macOS adoption grows in enterprise environments, these attacks exploit gaps in visibility and make early-stage detection harder.
๐ฏ In this case, attackers use a redirect from Google ads to a fake Claude Code documentation page and a ClickFix flow to deliver a payload. A terminal command downloads an encoded script, which installs AMOS Stealer, collects browser data, credentials, Keychain contents, and sensitive files, then deploys a backdoor.
The backdoor module (~/.mainhelper) was first described by Moonlock Lab in July 2025. Our analysis shows that it has since evolved. While the original version supported only a limited set of commands via periodic HTTP polling, the updated variant significantly expands functionality and introduces a ๐ณ๐๐น๐น๐ ๐ถ๐ป๐๐ฒ๐ฟ๐ฎ๐ฐ๐๐ถ๐๐ฒ ๐ฟ๐ฒ๐๐ฒ๐ฟ๐๐ฒ ๐๐ต๐ฒ๐น๐น ๐ผ๐๐ฒ๐ฟ ๐ช๐ฒ๐ฏ๐ฆ๐ผ๐ฐ๐ธ๐ฒ๐ ๐๐ถ๐๐ต ๐ฃ๐ง๐ฌ ๐๐๐ฝ๐ฝ๐ผ๐ฟ๐.
โ๏ธ This turns the infection from data theft into ๐ฝ๐ฒ๐ฟ๐๐ถ๐๐๐ฒ๐ป๐, ๐ต๐ฎ๐ป๐ฑ๐-๐ผ๐ป ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ ๐๐ต๐ฒ ๐ถ๐ป๐ณ๐ฒ๐ฐ๐๐ฒ๐ฑ ๐ ๐ฎ๐ฐ, giving the attacker real-time control over the system.
Multi-stage delivery, obfuscated scripts, and abuse of legitimate macOS components break visibility into fragmented signals. Triage slows down, and escalation decisions take longer, leading to credential theft and data exfiltration.
โก๏ธ #ANYRUN Sandbox lets security teams analyze macOS, Windows, Linux, and Android threats with full visibility into execution, attacker behavior, and artifacts, helping detect threats early, attribute activity, and build stronger detection logic, while reducing MTTD and MTTR.
See sample execution in a live analysis session: https://app.any.run/tasks/74f5000d-aa91-4745-9fc7-fdd95549874b/?utm_source=mastodon&utm_medium=post&utm_campaign=macOS_clickfix&utm_term=250326&utm_content=linktoservice
๐ฌ ๐๐ถ๐ป๐ฑ #๐๐ข๐๐ ๐ถ๐ป ๐๐ต๐ฒ ๐ฐ๐ผ๐บ๐บ๐ฒ๐ป๐๐ ๐ฎ๐ป๐ฑ ๐๐ฎ๐น๐ถ๐ฑ๐ฎ๐๐ฒ ๐๐ผ๐๐ฟ ๐ฑ๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ฐ๐ผ๐๐ฒ๐ฟ๐ฎ๐ด๐ฒ. Weโve broken down the attack chain in detail โ let us know if youโd like to see the full analysis!
๐จโ๐ป Expand your SOCโs cross-platform threat visibility. Learn how to boost performance and business security with #ANYRUN: https://any.run/cybersecurity-blog/anyrun-macos-sandbox/?utm_source=mastodon&utm_medium=post&utm_campaign=macOS_clickfix&utm_term=250326&utm_content=linktoblog
#cybersecurity #infosec