Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit AI to Distribute macOS Malware

Cybercriminals Exploit AI to Distribute macOS Malware

Posted on February 11, 2026 By CWS

Cybercriminals have launched a sophisticated attack campaign that takes advantage of user trust in artificial intelligence platforms to spread the Atomic macOS Stealer (AMOS). This represents a significant advancement in social engineering strategies.

AI and Google Ads: A New Threat Vector

This emerging threat cleverly combines legitimate AI chatbot services like ChatGPT and Grok with paid Google advertising. The aim is to trick unsuspecting Mac users into executing harmful terminal commands, thus compromising their systems.

The campaign targets individuals searching for popular troubleshooting solutions, such as freeing up disk space on macOS. It redirects them to seemingly trustworthy AI-generated instructions hosted on credible domains.

The ClickFix Technique

The attack utilizes a method known as “ClickFix,” which deceives users into manually executing shell commands that download and install malware on their devices.

What makes this campaign particularly potent is its ability to bypass traditional security measures. The instructions appear legitimate because they are hosted on official ChatGPT and Grok websites, not suspicious third-party domains.

The Infection Process

The infection chain starts when a Mac user performs a routine Google search for troubleshooting help, like “clear disk space on macOS.” Sponsored ads or top-ranking organic results lead victims to shared ChatGPT or Grok conversations that seem to offer genuine system maintenance advice.

These AI-generated conversations contain meticulously crafted instructions, prompting users to open their Terminal application and paste what appears to be an innocuous command.

The command downloads a script from an external domain controlled by the attackers, repeatedly asking for the user’s system password under the pretense of legitimate system operations. Once the correct credentials are entered, the script installs the AMOS infostealer along with a persistent backdoor that survives system reboots.

Protective Measures and Recommendations

The malware immediately targets cryptocurrency wallets such as Electrum, Exodus, Coinbase, MetaMask, and Ledger Live, extracting seed phrases and private keys for rapid theft of digital assets. It also harvests browser data from Chrome, Safari, and Firefox, including saved passwords and active login sessions.

Both organizations and individual Mac users should monitor for unsigned applications requesting system passwords, unusual Terminal activity, and unexpected network connections to unfamiliar domains.

Security teams must educate users that instructions appearing on trusted AI platforms can be compromised through social engineering. Any guidance that involves Terminal command execution should be independently verified through official support channels before implementation.

Cyber Security News Tags:AI exploitation, AMOS stealer, ChatGPT, cyber threat, Cybersecurity, Google Ads, Grok, macOS malware, malware distribution, social engineering

Post navigation

Previous Post: Microsoft to Update Windows Secure Boot in 2026
Next Post: Ivanti Releases Crucial Patches for Endpoint Manager

Related Posts

Hackers Earned 6,500 for 37 Unique 0-day Vulnerabilities Hackers Earned $516,500 for 37 Unique 0-day Vulnerabilities Cyber Security News
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News
Critical OpenSea Exploit Chain for Sale on Dark Web Critical OpenSea Exploit Chain for Sale on Dark Web Cyber Security News
Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Cyber Security News
Reclaim Security Secures M for Cybersecurity Innovation Reclaim Security Secures $26M for Cybersecurity Innovation Cyber Security News
Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI
  • Mac Users Face New Cloudflare-Themed Malware Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI
  • Mac Users Face New Cloudflare-Themed Malware Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark