Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New MacOS Attack Bypasses Security via Script Editor

New MacOS Attack Bypasses Security via Script Editor

Posted on April 9, 2026 By CWS

A recent cyber campaign targeting macOS systems has emerged, utilizing the Script Editor to deploy the Atomic Stealer infostealer, circumventing traditional Terminal-based defenses. This shift highlights attackers’ adaptability to Apple’s strengthened security measures, underscoring the persistent threat of social engineering.

Exploiting Apple’s Security Enhancements

Historically, ClickFix attacks have misled users into executing malicious commands via Terminal, disguised as routine maintenance. Apple’s response with macOS 26.4 included a feature to scrutinize pasted commands in Terminal, complicating this method. However, attackers have now redirected their efforts to the Script Editor, a macOS tool known for its automation capabilities and prior misuse in malware distribution.

Security experts at Jamf Threat Labs detected this new method through behavioral analysis, flagging Script Editor’s unexpected usage as suspicious. This discovery illustrates the rapid adaptation of threat actors when faced with new security controls, as they leveraged the applescript URL scheme to initiate Script Editor from a web browser, evading recent Terminal defenses.

Deceptive Web Pages and User Manipulation

The attack journey begins with a deceptive Apple-themed website, masquerading as a disk space management tool, offering guidance that mimics legitimate macOS procedures. Upon clicking the Execute button, users unknowingly activate the applescript URL scheme, prompting their browser to request permission to open Script Editor, making the malicious activity appear routine.

Once accessed, Script Editor presents a script falsely claiming to enhance Apple storage, enhancing its credibility. The macOS 26.4 update requires users to save this script before execution, adding a layer of user interaction.

Payload Execution and Security Recommendations

Execution of the script initiates an attack chain where obfuscated commands transform strings into URLs, utilizing the curl command to bypass TLS validation, allowing malware to communicate with suspicious networks. The payload, encoded in base64 and compressed with gzip, is decoded into a Mach-O binary, which is then executed, deploying the Atomic Stealer on the system.

Known indicators of compromise include domains like dryvecar.com and storage-fixes.squarespace.com, associated with fraudulent ClickFix websites. Users should exercise caution, avoiding scripts from unfamiliar web pages, and deny browser requests to open Script Editor. Keeping macOS updated ensures the latest security measures are in place to counteract such threats.

For ongoing updates and security advice, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google to stay informed.

Cyber Security News Tags:AppleScript, Atomic Stealer, browser vulnerabilities, ClickFix, cyber threats, Cybersecurity, InfoStealer, Jamf Threat Labs, macOS, macOS security, Malware, Script Editor, security updates, social engineering, system security

Post navigation

Previous Post: Understanding AI: Challenges, Risks, and Future Solutions
Next Post: Palo Alto Networks & SonicWall Fix Critical Security Bugs

Related Posts

North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials Cyber Security News
DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments Cyber Security News
Infostealer Malware: Rapid Path to Dark Web Exposure Infostealer Malware: Rapid Path to Dark Web Exposure Cyber Security News
Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Cyber Security News
Ransomware Tactics Evolve Beyond Vulnerable Drivers Ransomware Tactics Evolve Beyond Vulnerable Drivers Cyber Security News
North Korean Kimsuky Hackers Data Breach North Korean Kimsuky Hackers Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GitLab Urges Update to Fix Critical Security Flaws
  • STX RAT Emerges as a Stealthy Cyber Threat
  • UAT-10362: LucidRook Malware Targets Taiwanese NGOs
  • New MacOS Malware Targets Crypto Wallets with ClickFix
  • Palo Alto Networks & SonicWall Fix Critical Security Bugs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GitLab Urges Update to Fix Critical Security Flaws
  • STX RAT Emerges as a Stealthy Cyber Threat
  • UAT-10362: LucidRook Malware Targets Taiwanese NGOs
  • New MacOS Malware Targets Crypto Wallets with ClickFix
  • Palo Alto Networks & SonicWall Fix Critical Security Bugs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark