Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Tactics by AMOS Malware Target Apple Users

New Tactics by AMOS Malware Target Apple Users

Posted on February 24, 2026 By CWS

Atomic macOS Stealer (AMOS), a notorious malware, is employing new methods to infiltrate systems. Previously spread through pirated software, AMOS is now embedded in harmful OpenClaw skills. These skills, which enhance AI agent capabilities, are being exploited to distribute the malware.

Transition in AMOS Distribution Methods

AMOS is designed as a malware-as-a-service (MaaS) tool, targeting Apple users to extract sensitive information. This includes credentials, browser data, cryptocurrency wallet information, Telegram chats, VPN profiles, Apple keychain items, and files from common directories like Desktop and Documents.

Trend Micro researchers discovered a variant of AMOS concealed within OpenClaw skills, tracing its presence across various repositories. Malicious actors uploaded 39 harmful skills to platforms like ClawHub and GitHub, with over 2,200 found on GitHub alone. This marks a significant shift in AMOS’s distribution strategy, now focusing on supply chain attacks within AI agent environments.

Mechanics of the Attack

The attack initiates with a seemingly benign SKILL.md file, instructing the AI agent to download a fraudulent prerequisite, “OpenClawCLI,” from a malicious site. Less vigilant models, such as GPT-4o, may install it silently or persistently prompt the user to proceed with the manual installation.

More advanced models like Claude Opus 4.5 can identify the skill’s malicious intent and halt further action. If the user or AI agent proceeds, a Base64-encoded command is executed, installing a Mach-O universal binary that operates on both Intel and Apple Silicon Macs. A deceptive password prompt then appears, coaxing users into providing their system password, thereby granting the malware necessary access.

Implications and Recommendations

Upon acquiring the password, AMOS rapidly collects data including system credentials, files from critical folders, Apple keychains, and browser-stored cookies, passwords, and credit card data. It can also compromise information from 150 cryptocurrency wallets.

Collected data is bundled into a ZIP file and transmitted to a command-and-control server at socifiapp[.]com. Users should verify the source of any OpenClaw skill, refrain from entering passwords into unfamiliar prompts, test skills in isolated environments, and employ containers to restrict AI agent operations.

Conclusion

This evolving threat underscores the importance of vigilance and robust cybersecurity practices. As AMOS continues to adapt its methods, staying informed and cautious is crucial for safeguarding sensitive information.

Cyber Security News Tags:AI agents, AMOS, Apple, cyber threat, Cybersecurity, data protection, data theft, Hackers, macOS, Malware, malware-as-a-service, OpenClaw, password security, Security, Trend Micro

Post navigation

Previous Post: GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
Next Post: Upcoming DMARC Enhancements Discussed by Email Experts

Related Posts

MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data MCDonald’s Free Nuggets Hack Leads to Expose of Confidential Data Cyber Security News
Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cyber Security News
Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins Cyber Security News
Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot Cyber Security News
Top 10 Best Dynamic Malware Analysis Tools in 2026 Top 10 Best Dynamic Malware Analysis Tools in 2026 Cyber Security News
New Windows Notepad and Paint Update Brings More Useful AI Features New Windows Notepad and Paint Update Brings More Useful AI Features Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Upcoming DMARC Enhancements Discussed by Email Experts
  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages
  • AI-Powered Cyber Attacks Accelerate Threat Landscape

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Upcoming DMARC Enhancements Discussed by Email Experts
  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages
  • AI-Powered Cyber Attacks Accelerate Threat Landscape

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News