Home icon Chevron Categories Chevron Blog Chevron News Chevron

New macOS Malware Campaign Uses ClickFix Trick to Target Apple Users

New macOS Malware Campaign Uses ClickFix Trick to Target Apple Users

June 06, 2025


Cybersecurity experts have uncovered a fresh malware campaign targeting macOS users through a social engineering technique known as ClickFix. This operation aims to deceive users into downloading a malicious software called Atomic macOS Stealer (AMOS), designed to steal sensitive information from Apple devices.

Researchers at CloudSEK report that the attackers exploit lookalike domains mimicking the U.S. telecom company Spectrum. These fake sites prompt visitors to complete a CAPTCHA to “verify security,” but when users attempt the check, they encounter a failure message pushing them toward an “Alternative Verification” process.

Accepting this alternative causes a command to be copied to the user’s clipboard, along with instructions to run certain commands based on their operating system. While Windows users are directed to execute a PowerShell command, macOS users are instructed to run a shell script via the Terminal app.

This shell script asks users for their system password and proceeds to download the Atomic Stealer malware, which uses native macOS commands to harvest credentials, bypass defenses, and install malicious files.

Security analyst Koushik Pal points out that the attackers made several errors in their setup, such as mixing instructions for Windows and macOS users, suggesting a rushed deployment.

The campaign appears linked to Russian-speaking cybercriminals, as indicated by Russian comments found in the malware code.

This ClickFix tactic, which manipulates users into running harmful commands disguised as routine verifications, has been increasingly observed in recent months. Attackers leverage this method to deliver a wide array of malware, including trojans, stealers, and ransomware.

The threat actors commonly use fake CAPTCHA pages that look identical to legitimate services such as Google reCAPTCHA or Cloudflare Turnstile. These pages sometimes appear on compromised websites, making them harder to detect.

Experts warn that users’ habitual quick-clicking on verification prompts, known as “verification fatigue,” is exploited by these campaigns to gain unauthorized access and steal data.

Similar campaigns have targeted organizations via email phishing, with malicious links leading victims to fake CAPTCHA pages that install remote access tools or information stealers.

Security firms have detected numerous ClickFix-based attacks across multiple regions, including Europe, the Middle East, Africa, and the United States, noting that the technique is flexible and increasingly popular among cybercriminals.

Stay informed. Stay secure.
—Cybersecurity88 Editorial Team

Source: Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news

Did you like the post? Share it in your media

Latest Articles

Featured

India’s Cybersecurity Spending Expected to Reach $3.4 Billion by 2026 as AI-Powered Cyber Threats Continue to Grow

March 10, 2026 · Chetna Sehgal

India’s cybersecurity spending is expected to grow significantly as organizations face more adv...

Read More >
Featured

Malicious Chrome Extension Discovered After Developer Ownership Transfer

March 09, 2026 · Chetna Sehgal

Cybersecurity researchers have recently discovered a serious security issue involving a Google Ch...

Read More >
Featured

Web Server Exploits and Mimikatz Used in Cyberattacks Targeting Asian Critical Infrastructure

March 09, 2026 · Chetna Sehgal

Cybersecurity researchers recently discovered a new cyberattack campaign targeting critical infra...

Read More >
Featured

Iran-Linked MuddyWater Hackers Deploy New “Dindoor” Backdoor to Target U.S. Networks

March 06, 2026 · Chetna Sehgal

Cybersecurity researchers have recently uncovered a new cyber campaign linked to the Iranian hack...

Read More >
Featured

Microsoft Warns of ClickFix Attack Using Windows Terminal to Deploy Lumma Stealer

March 06, 2026 · Chetna Sehgal

Microsoft has recently revealed details about a new cyberattack campaign that is using a social-e...

Read More >
Featured

Global Operation Shuts Down Tycoon 2FA Phishing Service Behind 64,000 Attacks

March 05, 2026 · Chetna Sehgal

A major international law-enforcement operation has shut down Tycoon 2FA, a phishing-as-a-service...

Read More >
Newsletter line