Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit AI to Distribute macOS Malware

Cybercriminals Exploit AI to Distribute macOS Malware

Posted on February 11, 2026 By CWS

Cybercriminals have launched a sophisticated attack campaign that takes advantage of user trust in artificial intelligence platforms to spread the Atomic macOS Stealer (AMOS). This represents a significant advancement in social engineering strategies.

AI and Google Ads: A New Threat Vector

This emerging threat cleverly combines legitimate AI chatbot services like ChatGPT and Grok with paid Google advertising. The aim is to trick unsuspecting Mac users into executing harmful terminal commands, thus compromising their systems.

The campaign targets individuals searching for popular troubleshooting solutions, such as freeing up disk space on macOS. It redirects them to seemingly trustworthy AI-generated instructions hosted on credible domains.

The ClickFix Technique

The attack utilizes a method known as “ClickFix,” which deceives users into manually executing shell commands that download and install malware on their devices.

What makes this campaign particularly potent is its ability to bypass traditional security measures. The instructions appear legitimate because they are hosted on official ChatGPT and Grok websites, not suspicious third-party domains.

The Infection Process

The infection chain starts when a Mac user performs a routine Google search for troubleshooting help, like “clear disk space on macOS.” Sponsored ads or top-ranking organic results lead victims to shared ChatGPT or Grok conversations that seem to offer genuine system maintenance advice.

These AI-generated conversations contain meticulously crafted instructions, prompting users to open their Terminal application and paste what appears to be an innocuous command.

The command downloads a script from an external domain controlled by the attackers, repeatedly asking for the user’s system password under the pretense of legitimate system operations. Once the correct credentials are entered, the script installs the AMOS infostealer along with a persistent backdoor that survives system reboots.

Protective Measures and Recommendations

The malware immediately targets cryptocurrency wallets such as Electrum, Exodus, Coinbase, MetaMask, and Ledger Live, extracting seed phrases and private keys for rapid theft of digital assets. It also harvests browser data from Chrome, Safari, and Firefox, including saved passwords and active login sessions.

Both organizations and individual Mac users should monitor for unsigned applications requesting system passwords, unusual Terminal activity, and unexpected network connections to unfamiliar domains.

Security teams must educate users that instructions appearing on trusted AI platforms can be compromised through social engineering. Any guidance that involves Terminal command execution should be independently verified through official support channels before implementation.

Cyber Security News Tags:AI exploitation, AMOS stealer, ChatGPT, cyber threat, Cybersecurity, Google Ads, Grok, macOS malware, malware distribution, social engineering

Post navigation

Previous Post: Microsoft to Update Windows Secure Boot in 2026
Next Post: Ivanti Releases Crucial Patches for Endpoint Manager

Related Posts

VMware Cloud Foundation 9.0 Released With Modern Workloads & AI Services VMware Cloud Foundation 9.0 Released With Modern Workloads & AI Services Cyber Security News
Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware Cyber Security News
Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News
New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account Cyber Security News
CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark