Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware

Posted on November 27, 2025November 27, 2025 By CWS

Cybercriminals are efficiently concentrating on Apple customers by a classy social engineering scheme that methods victims into operating dangerous instructions on their computer systems.

The menace, referred to as FlexibleFerret, is attributed to North Korean operators and represents a unbroken evolution of the Contagious Interview marketing campaign that has been energetic all through 2025.

The malware primarily spreads by faux job recruitment web sites that promise employment alternatives however finally ship credential-stealing backdoors and system entry to attackers.

LinkedIn put up highlighting recruitment scams (Supply – Jamf)

The assault begins innocuously with job seekers visiting realistic-looking hiring evaluation web sites like evaluza.com and proficiencycert.com.

Victims full faux job assessments branded with names like “Blockchain Capital Operations Supervisor Hiring Evaluation,” offering private particulars and even recording video introductions.

After finishing these levels, candidates obtain a crucial instruction to run a selected Terminal command, which the attackers declare is required to repair digicam or microphone entry points.

Jamf safety analysts recognized this new variant after discovering in-the-wild detections linked to the script named macpatch.sh.

The researchers discovered JavaScript recordsdata on fraudulent recruitment websites designed to construct and execute curl instructions that obtain malicious payloads on to victims’ computer systems.

An infection mechanism

The an infection mechanism employs a multi-stage supply course of that is still hidden from customers. When the preliminary curl command executes, it downloads a shell script that determines whether or not the sufferer’s Mac makes use of ARM64 or Intel structure, then fetches the suitable stage-two payload.

The script creates working directories in momentary places, establishes persistence by LaunchAgents that robotically launch the malware at login, and shows a convincing faux Chrome software that mimics a official password immediate.

Left – faux Chrome digicam entry immediate, Proper – Chrome-style password immediate (Supply – Jamf)

This decoy software captures no matter credentials customers enter and sends them to a Dropbox account managed by the attackers.

The third stage prompts when a bundled Golang backdoor runs, establishing communication with a command-and-control server.

This subtle element helps a number of operations together with system data assortment, file add and obtain capabilities, command execution, Chrome profile theft, and automatic credential harvesting.

The backdoor maintains persistence by LaunchAgent entries and contains error-handling mechanisms that reset the malware if momentary failures happen.

Organizations ought to educate staff to view unsolicited job evaluation requests and Terminal-based repair directions with excessive suspicion.

Any recruitment communication asking customers to execute system instructions represents a big pink flag and ought to be reported instantly to safety groups.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Command, Deliver, Execute, FlexibleFerret, Hackers, macOS, Malware, Terminal, Tricks, Users

Post navigation

Previous Post: Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack
Next Post: Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web

Related Posts

Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Cyber Security News
Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Cyber Security News
Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability Cyber Security News
Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks Cyber Security News
11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark