Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit AI to Distribute macOS Malware

Cybercriminals Exploit AI to Distribute macOS Malware

Posted on February 11, 2026 By CWS

Cybercriminals have launched a sophisticated attack campaign that takes advantage of user trust in artificial intelligence platforms to spread the Atomic macOS Stealer (AMOS). This represents a significant advancement in social engineering strategies.

AI and Google Ads: A New Threat Vector

This emerging threat cleverly combines legitimate AI chatbot services like ChatGPT and Grok with paid Google advertising. The aim is to trick unsuspecting Mac users into executing harmful terminal commands, thus compromising their systems.

The campaign targets individuals searching for popular troubleshooting solutions, such as freeing up disk space on macOS. It redirects them to seemingly trustworthy AI-generated instructions hosted on credible domains.

The ClickFix Technique

The attack utilizes a method known as “ClickFix,” which deceives users into manually executing shell commands that download and install malware on their devices.

What makes this campaign particularly potent is its ability to bypass traditional security measures. The instructions appear legitimate because they are hosted on official ChatGPT and Grok websites, not suspicious third-party domains.

The Infection Process

The infection chain starts when a Mac user performs a routine Google search for troubleshooting help, like “clear disk space on macOS.” Sponsored ads or top-ranking organic results lead victims to shared ChatGPT or Grok conversations that seem to offer genuine system maintenance advice.

These AI-generated conversations contain meticulously crafted instructions, prompting users to open their Terminal application and paste what appears to be an innocuous command.

The command downloads a script from an external domain controlled by the attackers, repeatedly asking for the user’s system password under the pretense of legitimate system operations. Once the correct credentials are entered, the script installs the AMOS infostealer along with a persistent backdoor that survives system reboots.

Protective Measures and Recommendations

The malware immediately targets cryptocurrency wallets such as Electrum, Exodus, Coinbase, MetaMask, and Ledger Live, extracting seed phrases and private keys for rapid theft of digital assets. It also harvests browser data from Chrome, Safari, and Firefox, including saved passwords and active login sessions.

Both organizations and individual Mac users should monitor for unsigned applications requesting system passwords, unusual Terminal activity, and unexpected network connections to unfamiliar domains.

Security teams must educate users that instructions appearing on trusted AI platforms can be compromised through social engineering. Any guidance that involves Terminal command execution should be independently verified through official support channels before implementation.

Cyber Security News Tags:AI exploitation, AMOS stealer, ChatGPT, cyber threat, Cybersecurity, Google Ads, Grok, macOS malware, malware distribution, social engineering

Post navigation

Previous Post: Microsoft to Update Windows Secure Boot in 2026
Next Post: Ivanti Releases Crucial Patches for Endpoint Manager

Related Posts

Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Cyber Security News
Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices Cyber Security News
Iranian Cyber Threats Escalate Amid Middle East Tensions Iranian Cyber Threats Escalate Amid Middle East Tensions Cyber Security News
Evolution of DDoS Attacks Mitigation Strategies for 2025 Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
Disney Agreed to Pay  Million for Collection Personal Data From Children Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
GitHub Codespaces Vulnerability Enables Repository Takeover GitHub Codespaces Vulnerability Enables Repository Takeover Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark