Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer

Posted on December 10, 2025December 11, 2025 By CWS

Menace actors at the moment are leveraging the belief customers place in AI platforms like ChatGPT and Grok to distribute the Atomic macOS Stealer (AMOS).

A brand new marketing campaign found by Huntress on December 5, 2025, reveals that attackers have moved past mimicking trusted manufacturers to actively using authentic AI providers to host malicious payloads.​

The an infection chain begins with a routine Google search. Customers querying widespread troubleshooting phrases similar to “Clear disk house on macOS” are offered with high-ranking outcomes that look like useful guides hosted on authentic domains: chatgpt.com and grok.com.

AI outcomes on search

In contrast to conventional website positioning poisoning, which directs victims to compromised web sites, these hyperlinks result in precise, shareable conversations on OpenAI and xAI platforms.​

As soon as the consumer clicks the hyperlink, they’re offered with a professional-looking troubleshooting information. The dialog, generated by the attacker, instructs the consumer to open the macOS Terminal and copy-paste a particular command to “safely clear system knowledge.”

Weaponized Dialog

As a result of the recommendation seems to return from a trusted AI assistant on a good area, customers typically bypass their ordinary safety skepticism.​

ChatGPT and Grok Conversations Weaponized

In response to Huntress’ evaluation, the executed command doesn’t obtain a standard file that might set off macOS Gatekeeper warnings. As an alternative, it executes a base64-encoded script that downloads a variant of the AMOS stealer.​

The malware employs a “living-off-the-land” method to reap credentials and not using a graphical immediate. It makes use of the native dscl utility to validate the consumer’s password silently within the background.

As soon as validated, the password is piped into sudo -S to grant root privileges, permitting the malware to put in persistence mechanisms and exfiltrate knowledge with out additional consumer interplay.​

The next artifacts and behaviors have been recognized as key indicators of this marketing campaign:​

CategoryIndicator / BehaviorContextPersistence/Library/LaunchDaemons/com.finder.helper.plistA hidden executable was dropped within the consumer’s dwelling listing.File Path/Customers/$USER/.helperUsed to validate captured credentials with out GUI prompts silently.File Path/tmp/.passTemporary file used to retailer the plaintext password throughout escalation.Commanddscl -authonly Used to silently validate captured credentials with out GUI prompts.Commandsudo -SUsed to just accept the password by way of normal enter for root entry.NetworkLaunchDaemon is created for persistence.Recognized C2 URL for the preliminary payload supply (Base64 decoded).

This marketing campaign is perilous as a result of it exploits “behavioral belief” moderately than technical vulnerabilities. The assault circumvents conventional defenses like Gatekeeper as a result of the consumer explicitly authorizes the command within the Terminal.​

Safety groups are suggested to observe for anomalous osascript execution and weird dscl utilization, notably when related to curl instructions.

For finish customers, the first protection is behavioral: authentic AI providers is not going to request that customers execute opaque, encoded Terminal instructions for routine upkeep duties.

The shift to utilizing trusted AI domains as internet hosting infrastructure introduces a brand new chokepoint for defenders, who should now scrutinize site visitors to these platforms for malicious patterns.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actors, AMOS, ChatGPT, Conversations, Deploy, Grok, Stealer, Threat, Weaponize

Post navigation

Previous Post: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
Next Post: Fortinet Patches Critical Authentication Bypass Vulnerabilities

Related Posts

North Korean Hackers Attacking Developers with 338 Malicious npm Packages Cyber Security News
Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Cyber Security News
Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Cyber Security News
Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node Cyber Security News
New ARTEMIS AI Agent Outperformed 9 out of 10 Human Penetration Testers in Detecting Vulnerabilities Cyber Security News
Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark