Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GhostClaw Malware Targets macOS Users with AI Tools

GhostClaw Malware Targets macOS Users with AI Tools

Posted on March 26, 2026 By CWS

A sophisticated malware campaign known as GhostClaw is currently targeting macOS users by leveraging artificial intelligence and fake GitHub repositories. This campaign utilizes deceptive tactics to steal user credentials and deploy harmful payloads on affected systems.

Deceptive Distribution Techniques

GhostClaw initially emerged in March 2026, as documented by JFrog Security Research. The malware was initially spread through malicious npm packages designed to deceive developers who regularly download tools from public package registries. However, it has since expanded to include repositories on GitHub that mimic common developer resources like trading bots and software development kits.

Researchers at Jamf Threat Labs identified multiple GitHub repositories connected to the GhostClaw activity. Their findings revealed new infection vectors and infrastructure, confirming the campaign’s expansion beyond its original npm-based delivery method. One notable repository, TradingView-Claw, misleadingly garnered 386 stars, adding an appearance of legitimacy to unwary developers.

Advanced Infection Strategies

The GhostClaw campaign employs a dual infection strategy that makes it particularly insidious. In one method, the malware uses README files with detailed instructions that direct users to execute a shell command via curl. This path exploits the user’s trust in typical development workflows to initiate infection.

Alternatively, the malware targets AI-driven coding agents through SKILL.md files that define execution commands. This approach enables automated development tools to inadvertently trigger the infection chain without direct user intervention, broadening the scope of potential victims.

Multi-Stage Execution and Credential Harvesting

Regardless of the initial infection method, GhostClaw employs a consistent multi-stage process to compromise systems. The process begins with an install.sh script, masquerading as a routine setup tool, which silently installs a version of Node.js without requiring elevated privileges. The script’s use of the insecure curl flag to bypass TLS verification is a red flag for security-conscious users.

The setup.js script follows, obfuscated to avoid detection, and is responsible for collecting credentials. To conceal its activity, the script displays fake progress indicators that mimic legitimate installations. The malware then prompts for credentials, validating them using the native macOS binary dscl, thereby avoiding standard authentication dialogs.

Once access is secured, the malware communicates with a command-and-control server to download an encrypted payload, ensuring its persistence by relocating to a directory associated with normal npm activity. Users are advised to verify the origin of any code before execution, especially from seemingly credible sources on GitHub.

Security teams should remain vigilant for unusual dscl usage or processes attempting to gain unauthorized access. Monitoring such activities can help mitigate the risks posed by sophisticated threats like GhostClaw.

Cyber Security News Tags:AI tools, credential theft, Cybersecurity, GhostClaw, GitHub, Jamf Threat Labs, macOS, Malware, npm packages, software supply chain

Post navigation

Previous Post: China-Linked Group Uses BPFDoor to Spy on Telecoms
Next Post: Admin Behind LeakBase Hacker Forum Arrested in Russia

Related Posts

AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes Cyber Security News
Indirect Prompt Injection Threatens AI Security Indirect Prompt Injection Threatens AI Security Cyber Security News
Critical Apache Syncope Vulnerability Exposes User Sessions Critical Apache Syncope Vulnerability Exposes User Sessions Cyber Security News
Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers Cyber Security News
Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft Cyber Security News
Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Admin Behind LeakBase Hacker Forum Arrested in Russia
  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation
  • CISA Highlights Exploited Langflow Code Injection Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Admin Behind LeakBase Hacker Forum Arrested in Russia
  • GhostClaw Malware Targets macOS Users with AI Tools
  • China-Linked Group Uses BPFDoor to Spy on Telecoms
  • Critical IDrive Windows Flaw Allows Privilege Escalation
  • CISA Highlights Exploited Langflow Code Injection Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark