Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Tactics by AMOS Malware Target Apple Users

New Tactics by AMOS Malware Target Apple Users

Posted on February 24, 2026 By CWS

Atomic macOS Stealer (AMOS), a notorious malware, is employing new methods to infiltrate systems. Previously spread through pirated software, AMOS is now embedded in harmful OpenClaw skills. These skills, which enhance AI agent capabilities, are being exploited to distribute the malware.

Transition in AMOS Distribution Methods

AMOS is designed as a malware-as-a-service (MaaS) tool, targeting Apple users to extract sensitive information. This includes credentials, browser data, cryptocurrency wallet information, Telegram chats, VPN profiles, Apple keychain items, and files from common directories like Desktop and Documents.

Trend Micro researchers discovered a variant of AMOS concealed within OpenClaw skills, tracing its presence across various repositories. Malicious actors uploaded 39 harmful skills to platforms like ClawHub and GitHub, with over 2,200 found on GitHub alone. This marks a significant shift in AMOS’s distribution strategy, now focusing on supply chain attacks within AI agent environments.

Mechanics of the Attack

The attack initiates with a seemingly benign SKILL.md file, instructing the AI agent to download a fraudulent prerequisite, “OpenClawCLI,” from a malicious site. Less vigilant models, such as GPT-4o, may install it silently or persistently prompt the user to proceed with the manual installation.

More advanced models like Claude Opus 4.5 can identify the skill’s malicious intent and halt further action. If the user or AI agent proceeds, a Base64-encoded command is executed, installing a Mach-O universal binary that operates on both Intel and Apple Silicon Macs. A deceptive password prompt then appears, coaxing users into providing their system password, thereby granting the malware necessary access.

Implications and Recommendations

Upon acquiring the password, AMOS rapidly collects data including system credentials, files from critical folders, Apple keychains, and browser-stored cookies, passwords, and credit card data. It can also compromise information from 150 cryptocurrency wallets.

Collected data is bundled into a ZIP file and transmitted to a command-and-control server at socifiapp[.]com. Users should verify the source of any OpenClaw skill, refrain from entering passwords into unfamiliar prompts, test skills in isolated environments, and employ containers to restrict AI agent operations.

Conclusion

This evolving threat underscores the importance of vigilance and robust cybersecurity practices. As AMOS continues to adapt its methods, staying informed and cautious is crucial for safeguarding sensitive information.

Cyber Security News Tags:AI agents, AMOS, Apple, cyber threat, Cybersecurity, data protection, data theft, Hackers, macOS, Malware, malware-as-a-service, OpenClaw, password security, Security, Trend Micro

Post navigation

Previous Post: GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
Next Post: Upcoming DMARC Enhancements Discussed by Email Experts

Related Posts

Microsoft Releases Emergency Fix for BitLocker Recovery Issue Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses Cyber Security News
Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware Cyber Security News
BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Antivirus Site Spreads ValleyRAT Malware
  • Upcoming DMARC Enhancements Discussed by Email Experts
  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Antivirus Site Spreads ValleyRAT Malware
  • Upcoming DMARC Enhancements Discussed by Email Experts
  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News