Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer

Posted on September 20, 2025September 20, 2025 By CWS

Sep 20, 2025Ravie LakshmananSoftware Safety / Malware
LastPass is warning of an ongoing, widespread info stealer marketing campaign concentrating on Apple macOS customers by means of faux GitHub repositories that distribute malware-laced packages masquerading as legit instruments.

“Within the case of LastPass, the fraudulent repositories redirected potential victims to a repository that downloads the Atomic infostealer malware,” researchers Alex Cox, Mike Kosak, and Stephanie Schneider from the LastPass Risk Intelligence, Mitigation, and Escalation (TIME) staff stated.

Past LastPass, a few of the common instruments impersonated within the marketing campaign embody 1Password, Basecamp, Dropbox, Gemini, Hootsuite, Notion, Obsidian, Robinhood, Salesloft, SentinelOne, Shopify, Thunderbird, and TweetDeck, amongst others. All of the GiHub repositories are designed to focus on macOS techniques.

The assaults contain the usage of Search Engine Optimization (search engine marketing) poisoning to push hyperlinks to malicious GitHub websites on high of search outcomes on Bing and Google, that then instruct customers to the obtain this system by clicking the “Set up LastPass on MacBook” button, redirecting them a GitHub web page area.

“The GitHub pages seem like created by a number of GitHub usernames to get round takedowns,” LastPass stated.

The GitHub web page is designed to take the consumer to a different area that gives ClickFix-style directions to repeat and execute a command on the Terminal app, ensuing within the deployment of the Atomic Stealer malware.

It is price noting comparable campaigns have been beforehand leveraged malicious sponsored Google Adverts for Homebrew to distribute a multi-stage dropper by means of a bogus GitHub repository that may run detect digital machines or evaluation environments, and decode and execute system instructions to ascertain reference to a distant server, per safety researcher Dhiraj Mishra.

In latest weeks, risk actors have been noticed leveraging public GitHub repositories to host malicious payloads and distribute them through Amadey, in addition to make use of dangling commits similar to an official GitHub repository to redirect unwitting customers to malicious packages.

The Hacker News Tags:Atomic, Fake, Infecting, InfoStealer, LastPass, macOS, Repositories, Warns

Post navigation

Previous Post: Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
Next Post: Top Zero-Day Vulnerabilities Exploited in the Wild in 2025

Related Posts

17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge The Hacker News
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks The Hacker News
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds The Hacker News
Beware the Hidden Risk in Your Entra Environment The Hacker News
Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News