ClickFix campaigns are now leveraging LLM-generated public artifacts for malware distribution.

Per Moonlock Lab and AdGuard:
• Abuse of Claude artifact pages
• Google Ads search poisoning
• Obfuscated shell execution (base64 decode → zsh)
• Second-stage loader for MacSync infostealer
• Hardcoded API key + token-protected C2
• AppleScript (osascript) handling data theft
• Archive staging at /tmp/osalogging.zip
• Multi-attempt POST exfiltration

Previous campaigns exploited ChatGPT and Grok sharing features.
LLM trust is now an operational risk vector.
Should EDR flag suspicious AI-guided shell patterns?

Source: https://www.bleepingcomputer.com/news/security/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack/

Engage below.
Follow @technadu for deep technical threat analysis.

#ThreatIntel #MacOSSecurity #Infostealer #C2Traffic #ClickFix #LLMSecurity #MalwareAnalysis #AppSec #BlueTeam #EDR #ThreatHunting #CyberThreats #ZeroTrust

Safari 26.3 patches 6 critical vulnerabilities CFNetwork flaw allowed arbitrary file writing. AdwaitX analyzes WebKit security fixes for macOS Sonoma and Sequoia users. Update now to protect browsing data #AdwaitX #Safari #macOSSecurity

https://www.adwaitx.com/safari-26-3-security-update-vulnerabilities-fixed/

Safari 26.3 Security Update: 6 Critical Vulnerabilities Fixed

Apple releases Safari 26.3 security update. Critical analysis of 6 CVE vulnerabilities patched for macOS Sonoma and Sequoia users in February 2026. AdwaitX

AdwaitX

It's been a busy 24 hours in the cyber world with significant updates on recent breaches, actively exploited vulnerabilities, new malware and threat actor insights, and a stark warning about AI's impact on the threat landscape. Let's dive in:

Recent Cyber Attacks and Breaches 🚨

- The University of Phoenix has confirmed a data breach impacting nearly 3.5 million individuals, including students, staff, and suppliers. The Clop ransomware gang exploited a zero-day vulnerability (CVE-2025-61882) in the Oracle E-Business Suite (EBS) to steal sensitive personal and financial information. Harvard and the University of Pennsylvania were also hit by this same Clop campaign.
- Romania's national water management agency, Administrația Națională Apele Române (Romanian Waters), was hit by a ransomware attack that compromised approximately 1,000 systems. Attackers used Windows' built-in BitLocker for encryption, leaving ransom notes, but operational technology (OT) systems and water infrastructure remain unaffected. The National Cyber Security Directorate (DNSC) advises against negotiation.
- France's national postal service, La Poste, and its banking arm, La Banque Postale, experienced service disruptions due to a suspected Distributed Denial-of-Service (DDoS) attack just days before Christmas. While no customer data compromise was reported, online services and parcel distribution were affected. This follows the recent arrest of a 22-year-old suspect for hacking the French Interior Ministry's email server.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/university-of-phoenix-data-breach-impacts-nearly-35-million-individuals/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/22/around_1000_systems_compromised_in/
🗞️ The Record | https://therecord.media/romania-national-water-agency-ransomware-attack
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/romanian-water-authority-hit-by-ransomware-attack-over-weekend/
🗞️ The Record | https://therecord.media/la-poste-france-ddos-disruption-days-before-christmas
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/21/infosec_news_in_brief/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/22/asia_tech_news_roundup/

Vulnerabilities and Active Exploitation ⚠️

- Over 115,000 WatchGuard Firebox devices exposed online remain unpatched against a critical remote code execution (RCE) vulnerability, CVE-2025-14733, which is actively being exploited. This flaw affects Fireware OS 11.x, 12.x, and 2025.1, allowing unauthenticated attackers to execute arbitrary code. CISA has added it to its Known Exploited Vulnerabilities (KEV) Catalog, ordering federal agencies to patch immediately.
- Multiple network security products from Fortinet, SonicWall, and Cisco have also seen vulnerabilities actively exploited. A China-nexus APT, UAT-9686, is abusing CVE-2025-20393 in Cisco AsyncOS to deploy malware like ReverseSSH. SonicWall fixed CVE-2025-40602, a local privilege escalation flaw, which combined with CVE-2025-23006, leads to unauthenticated RCE on SMA 100 series appliances.
- CISA recently added CVE-2025-59374, related to the 2018-2019 "ShadowHammer" supply-chain attack on ASUS Live Update, to its KEV catalog. However, it's crucial to note this is a retrospective classification for an End-of-Life (EoL) product and does not indicate a newly emerging threat or renewed urgency for currently supported systems.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/over-115-000-watchguard-firewalls-vulnerable-to-ongoing-rce-attacks/
⚡ The Hacker News | https://thehackernews.com/2025/12/weekly-recap-firewall-exploits-ai-data.html
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/not-all-cisa-linked-alerts-are-urgent-asus-live-update-cve-2025-59374/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/21/infosec_news_in_brief/

New Threat Research and Tradecraft 🛡️

- Android malware operations are becoming increasingly sophisticated, merging droppers, SMS theft, and RAT capabilities. "Wonderland" (formerly WretchedCat) is targeting Uzbekistan via malicious droppers, using Telegram for C2, stealing SMS/OTPs, and exfiltrating contacts. Other new Android malware like Cellik (RAT with Play Store integration), Frogblight (SMS phishing for banking creds in Turkey), and NexusRoute (government-branded phishing for RAT in India) highlight this trend.
- A malicious npm package named `lotusbail`, masquerading as a legitimate WhatsApp Web API library, has been found stealing WhatsApp authentication tokens, session keys, intercepting messages, and exfiltrating contacts and media files. The package, a fork of WhiskeySockets Baileys, also grants attackers persistent access to victims' WhatsApp accounts even after removal.
- The MacSync information stealer for macOS has evolved its distribution method, now delivered via a digitally signed and notarised Swift application. This new dropper successfully evades macOS Gatekeeper checks, though the certificate has since been revoked. MacSync is capable of stealing iCloud keychain credentials, browser passwords, cryptocurrency wallet data, and files.
- Ukrainian national Artem Aleksandrovych Stryzhak pleaded guilty to his role as an affiliate in the Nefilim ransomware gang, which targeted high-revenue businesses globally. Stryzhak received 20% of ransom payments and used "Corporate Leaks" sites to pressure victims. Co-conspirator Volodymyr Tymoshchuk, an alleged administrator for Nefilim, LockerGoga, and MegaCortex, remains at large with an $11 million reward offered for information.
- A pro-Ukrainian cyberespionage group, Goffee (also known as Paper Werewolf), is targeting Russian military personnel and defense-industry organisations with phishing campaigns. Lures include fake New Year concert invitations and official-looking letters from the Ministry of Industry and Trade, often featuring AI-generated decoys with linguistic errors. The group deploys the EchoGather backdoor to collect system information and execute commands.
- Other notable threat actor activities include China-aligned Ink Dragon targeting European governments and repurposing victims for further operations, and LongNosedGoblin using Group Policy to deploy the NosyDoor backdoor in Southeast Asia and Japan. North Korean Kimsuky is spreading DocSwap Android malware via QR codes on phishing sites, while Arcane Werewolf targets Russian manufacturing with the Loki 2.1 implant. RansomHouse has upgraded its encryption to a two-factor scheme, making decryption significantly harder.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/new-macsync-malware-dropper-evades-macos-gatekeeper-checks/
⚡ The Hacker News | https://thehackernews.com/2025/12/android-malware-operations-merge.html
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/malicious-npm-package-steals-whatsapp-accounts-and-messages/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/ukrainian-hacker-admits-affiliate-role-in-nefilim-ransomware-gang/
🗞️ The Record | https://therecord.media/nefilim-ransomware-hacker-fraud
🗞️ The Record | https://therecord.media/cyber-spies-fake-new-year-concert-russian-phishing
⚡ The Hacker News | https://thehackernews.com/2025/12/weekly-recap-firewall-exploits-ai-data.html

AI's Impact on the Threat Landscape 🤖

- Sanaz Yashar, CEO of Zafran Security and former IDF Unit 8200 "hacking architect," warns that the "WannaCry of AI will happen." She highlights that AI is accelerating the "time-to-exploit" (TTE) to a negative value, meaning vulnerabilities are being weaponised and exploited *before* patches are released.
- Yashar notes that 78% of vulnerabilities are now being weaponised by LLMs and AI, and the increasing use of AI in corporate systems expands the attack surface through prompt injection and AI agent manipulation.
- The greatest danger, she argues, comes from "junior" hackers using AI, who may not understand the full collateral damage of their actions, potentially shutting down critical infrastructure without intent. The solution, she suggests, is also AI, through proactive threat exposure management platforms.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/22/spy_turned_startup_ceo/

Data Privacy Concerns 🔒

- South Korea will now require facial recognition scans for new mobile phone number registrations to combat widespread scams and identity theft. This move comes after two major data breaches this year impacted over half the nation's population, including SK Telecom, which was fined $100 million and ordered to compensate 23 million customers $1.55 billion for poor infosec practices.
- Google is discontinuing its "Dark Web Report" email service, stating it didn't provide "helpful next steps." Users are directed to existing tools like security checkups and password managers, but the "Results about you" tool, which flags personal info in Google Search, requires significant personal data submission.
- A popular Chrome and Microsoft Edge extension, Urban VPN Proxy (with over 7.3 million installs), was caught stealthily harvesting every prompt users entered into AI chatbots like ChatGPT, Claude, and Copilot. This highlights a significant risk of data exposure through seemingly innocuous browser extensions.
- Texas Attorney General Ken Paxton has sued Sony, Samsung, LG, Hisense, and TCL, accusing them of illegally spying on customers by using Automated Content Recognition (ACR) technology in smart TVs. The lawsuit claims ACR captures screenshots and monitors viewing activity without informed consent to serve targeted ads.
- Privacy non-profit noyb has filed GDPR complaints against TikTok, AppsFlyer, and Grindr, alleging unlawful cross-app tracking. A user's Grindr usage, including details about their sexual orientation, was reportedly sent to TikTok via AppsFlyer, raising serious concerns about sensitive data handling.
- A California federal judge has denied NSO Group's request to stay an order preventing them from using WhatsApp infrastructure for spyware attacks. The court found NSO went "far beyond their authorized use" in targeting 1,400 WhatsApp users with Pegasus spyware in 2019.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/22/south_korea_facial_verification/
🗞️ The Record | https://therecord.media/south-korea-facial-recognition-phones
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/21/infosec_news_in_brief/
⚡ The Hacker News | https://thehackernews.com/2025/12/weekly-recap-firewall-exploits-ai-data.html
🗞️ The Record | https://therecord.media/judge-rules-nso-cannot-continue-whatsapp-spyware

Regulatory Actions and Law Enforcement ⚖️

- In response to Japan’s Mobile Software Competition Act (MSCA), Apple and Google have reluctantly begun allowing developers to distribute apps through third-party stores and accept alternative payment providers. Both tech giants expressed concerns about potential increases in malware, fraud, and privacy risks due to these changes.
- An Interpol-coordinated initiative, "Operation Sentinel," led to the arrest of 574 individuals and the recovery of $3 million linked to business email compromise, extortion, and ransomware incidents across Africa. The operation also took down over 6,000 malicious links and decrypted six distinct ransomware variants.
- US authorities have seized the servers and infrastructure of the E-Note cryptocurrency exchange, alleging it laundered over $70 million from ransomware and account takeover attacks since 2017. The site's operator, a 39-year-old Russian national, has been indicted on conspiracy to launder monetary instruments charges.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/22/asia_tech_news_roundup/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/
⚡ The Hacker News | https://thehackernews.com/2025/12/weekly-recap-firewall-exploits-ai-data.html

#CyberSecurity #ThreatIntelligence #Ransomware #Vulnerability #RCE #ZeroDay #APT #Malware #AndroidSecurity #macOSSecurity #DataPrivacy #AI #IncidentResponse #LawEnforcement #InfoSec

University of Phoenix data breach impacts nearly 3.5 million individuals

The Clop ransomware gang has stolen the data of nearly 3.5 million University of Phoenix (UoPX) students, staff, and suppliers after breaching the university's network in August.

BleepingComputer

A new macOS-focused AMOS infostealer campaign is redirecting users to shared ChatGPT and Grok conversations via malicious Google ads. The chats contain Terminal commands that decode into a script installing AMOS with elevated privileges.

AMOS then targets crypto wallets, browser data, Keychain items, and more - with persistence handled through LaunchDaemons and AppleScripts.

This campaign highlights how AI platforms and search ads can be misused as delivery mechanisms.

What safeguards should exist to prevent similar abuse?

Source:
https://www.bleepingcomputer.com/news/security/google-ads-for-shared-chatgpt-grok-guides-push-macos-infostealer-malware/

Follow TechNadu for more threat-intel updates.

#Infosec #ThreatIntel #macOSSecurity #AMOS #Malware #DigitalSafety #AIChatSecurity #CyberAwareness

El equipo de Jamf Threat Labs nos trae un informe sobre #DigitStealer: un sofisticado programa para robar información de macOS suplantando al software #DynamicLake de Aviorrok

#ciberseguridad #macOSSecurity #macOS

https://mecambioamac.com/digitstealer-un-sofisticado-programa-para-robar-informacion-de-macos/

DigitStealer, un sofisticado programa para robar información de macOS

DigitStealer, un sofisticado programa para robar información de macOS haciéndose pasar por el software legítimo DynamicLake

mecambioaMac

Nuevas mejoras en la seguridad de macOS Tahoe y en iOS que llegan en la versión 26.1: las Mejoras de Seguridad en Segundo Plano

#macOSTahoe #iOS26 #MacOSSecurity #AppleSecurity #CyberSecurity #ciberseguridad

https://mecambioamac.com/macos-tahoe-26-1-activa-las-mejoras-de-seguridad-en-segundo-plano/

macOS Tahoe 26.1 activa las Mejoras de Seguridad en Segundo Plano

macOS Tahoe 26.1 añade una nueva capa de seguridad: ha activado las Mejoras de Seguridad en Segundo Plano. Te explico dónde configurarlo

mecambioaMac

The ULTIMATE macOS Privacy & Security Guide!

https://techlore.tv/w/edQXbpKGwuGKssTJf2UrLa

The ULTIMATE macOS Privacy & Security Guide!

PeerTube

A seemingly routine tool update could be a trap—malware like AMOS and Odyssey are stealthily targeting macOS developers and snatching credentials and source code. Are you prepared for this new wave of cyber threats?

https://thedefendopsdiaries.com/the-rise-of-infostealers-amos-and-odyssey-target-macos-developers/

#macossecurity
#infostealers
#cyberthreats
#amosmalware
#odysseymalware

macOS Tahoe agrega desbloqueo remoto para FileVault mediante SSH

Cómo desbloquear en modo remoto FileVault tu Mac con macOS Tahoe a través de SSH

mecambioaMac
Varios cambios significativos de macOS Tahoe 26 y FileVault

Importantes novedades en la seguridad y privacidad en macOS Tahoe. Cómo proteger la información del Mac con FileVault

mecambioaMac