Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
macOS Users Targeted by Malware via Google Ads

macOS Users Targeted by Malware via Google Ads

Posted on February 14, 2026 By CWS

A recent malware campaign has been exploiting macOS users by infiltrating Google-sponsored search results and leveraging legitimate platforms, such as Anthropic’s Claude AI and Medium. This sophisticated attack has already targeted over 15,000 users through two distinct methods, capitalizing on the users’ trust in well-known online services.

Methods of Attack

The initial attack strategy uses Google Ads to promote a malicious Claude AI artifact, masquerading as a legitimate macOS security guide. This occurs when users search for “Online dns resolver,” leading them to a sponsored link that redirects to a public Claude artifact titled “macOS Secure Command Execution.” This deceptive guide instructs users to paste a base64-encoded command into their Terminal application, which decodes and runs a harmful script designed to download the MacSync information stealer malware.

After execution, the malware connects with its command-and-control server at a2abotnet[.]com/dynamic using predefined authentication credentials. To avoid detection, it disguises its network traffic as normal web browsing by mimicking legitimate macOS browser User-Agent strings. The payload then retrieves an AppleScript component responsible for extracting sensitive data like keychain information, browser data, and cryptocurrency wallet details.

Data Exfiltration Techniques

According to cybersecurity experts at Moonlock Lab, the stolen data is compressed and saved in /tmp/osalogging.zip before being sent to a2abotnet[.]com/gate through HTTP POST requests. The malware incorporates advanced retry strategies for managing large data transfers, including chunked uploads with up to eight retries and exponential backoff. Upon successful data transfer, it deletes the staging files to avoid leaving traces.

The second variant of the attack targets users searching for “macos cli disk space analyzer” through a Medium article hosted at apple-mac-disk-space.medium[.]com. This article pretends to be from Apple’s official Support Team and uses the same ClickFix social engineering technique, albeit with double-layered encoding and a different hosting setup. The malicious command cleverly uses string concatenation (cur””l instead of curl) to evade pattern-based detection systems.

Growing Threats and Precautionary Measures

These attack variants underscore the rising trend of cybercriminals abusing legitimate platforms and trusted services to spread malware. The use of Google Ads in malware distribution emphasizes the crucial need for verifying the authenticity of sources, even when they appear in sponsored search results. MacOS users are strongly advised to refrain from executing terminal commands from unfamiliar sources and to verify the authenticity of support articles claiming to be from Apple or other reputable vendors.

Organizations should deploy endpoint detection solutions capable of monitoring suspicious terminal activity and network connections to unverified command-and-control servers. Staying informed about cybersecurity threats is essential for protection, and users are encouraged to follow updates on reliable platforms.

Cyber Security News Tags:Claude AI, cyber attacks, Cybersecurity, data theft, Google Ads, macOS, Malware, Medium, online safety, Security, Threat Actors

Post navigation

Previous Post: Critical OpenSea Exploit Chain for Sale on Dark Web
Next Post: Data Breach by Over 300 Chrome Extensions Uncovered

Related Posts

Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Cybercriminals Exploit Fake Avast Site for Credit Card Data Cybercriminals Exploit Fake Avast Site for Credit Card Data Cyber Security News
CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices Cyber Security News
Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year Cyber Security News
PylangGhost RAT Targets Developers via npm Packages PylangGhost RAT Targets Developers via npm Packages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative
  • Healthcare Firm Faces Cyberattack Exposing Patient Data
  • Venom Stealer: Revolutionizing Cyber Threats with Persistent Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative
  • Healthcare Firm Faces Cyberattack Exposing Patient Data
  • Venom Stealer: Revolutionizing Cyber Threats with Persistent Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark