Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
macOS Users Targeted by Malware via Google Ads

macOS Users Targeted by Malware via Google Ads

Posted on February 14, 2026 By CWS

A recent malware campaign has been exploiting macOS users by infiltrating Google-sponsored search results and leveraging legitimate platforms, such as Anthropic’s Claude AI and Medium. This sophisticated attack has already targeted over 15,000 users through two distinct methods, capitalizing on the users’ trust in well-known online services.

Methods of Attack

The initial attack strategy uses Google Ads to promote a malicious Claude AI artifact, masquerading as a legitimate macOS security guide. This occurs when users search for “Online dns resolver,” leading them to a sponsored link that redirects to a public Claude artifact titled “macOS Secure Command Execution.” This deceptive guide instructs users to paste a base64-encoded command into their Terminal application, which decodes and runs a harmful script designed to download the MacSync information stealer malware.

After execution, the malware connects with its command-and-control server at a2abotnet[.]com/dynamic using predefined authentication credentials. To avoid detection, it disguises its network traffic as normal web browsing by mimicking legitimate macOS browser User-Agent strings. The payload then retrieves an AppleScript component responsible for extracting sensitive data like keychain information, browser data, and cryptocurrency wallet details.

Data Exfiltration Techniques

According to cybersecurity experts at Moonlock Lab, the stolen data is compressed and saved in /tmp/osalogging.zip before being sent to a2abotnet[.]com/gate through HTTP POST requests. The malware incorporates advanced retry strategies for managing large data transfers, including chunked uploads with up to eight retries and exponential backoff. Upon successful data transfer, it deletes the staging files to avoid leaving traces.

The second variant of the attack targets users searching for “macos cli disk space analyzer” through a Medium article hosted at apple-mac-disk-space.medium[.]com. This article pretends to be from Apple’s official Support Team and uses the same ClickFix social engineering technique, albeit with double-layered encoding and a different hosting setup. The malicious command cleverly uses string concatenation (cur””l instead of curl) to evade pattern-based detection systems.

Growing Threats and Precautionary Measures

These attack variants underscore the rising trend of cybercriminals abusing legitimate platforms and trusted services to spread malware. The use of Google Ads in malware distribution emphasizes the crucial need for verifying the authenticity of sources, even when they appear in sponsored search results. MacOS users are strongly advised to refrain from executing terminal commands from unfamiliar sources and to verify the authenticity of support articles claiming to be from Apple or other reputable vendors.

Organizations should deploy endpoint detection solutions capable of monitoring suspicious terminal activity and network connections to unverified command-and-control servers. Staying informed about cybersecurity threats is essential for protection, and users are encouraged to follow updates on reliable platforms.

Cyber Security News Tags:Claude AI, cyber attacks, Cybersecurity, data theft, Google Ads, macOS, Malware, Medium, online safety, Security, Threat Actors

Post navigation

Previous Post: Critical OpenSea Exploit Chain for Sale on Dark Web
Next Post: Data Breach by Over 300 Chrome Extensions Uncovered

Related Posts

Microsoft’s February 2026 Update Fixes 54 Vulnerabilities Microsoft’s February 2026 Update Fixes 54 Vulnerabilities Cyber Security News
New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs Cyber Security News
HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information Cyber Security News
Critical OpenClaw Vulnerability Allows AI Agent Hijacking Critical OpenClaw Vulnerability Allows AI Agent Hijacking Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News
PayPal Breach Exposes Sensitive Customer Information PayPal Breach Exposes Sensitive Customer Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic’s Claude Code Leak: Human Error Leads to Source Code Exposure
  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative
  • Healthcare Firm Faces Cyberattack Exposing Patient Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic’s Claude Code Leak: Human Error Leads to Source Code Exposure
  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative
  • Healthcare Firm Faces Cyberattack Exposing Patient Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark