Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
macOS Users Targeted by Malware via Google Ads

macOS Users Targeted by Malware via Google Ads

Posted on February 14, 2026 By CWS

A recent malware campaign has been exploiting macOS users by infiltrating Google-sponsored search results and leveraging legitimate platforms, such as Anthropic’s Claude AI and Medium. This sophisticated attack has already targeted over 15,000 users through two distinct methods, capitalizing on the users’ trust in well-known online services.

Methods of Attack

The initial attack strategy uses Google Ads to promote a malicious Claude AI artifact, masquerading as a legitimate macOS security guide. This occurs when users search for “Online dns resolver,” leading them to a sponsored link that redirects to a public Claude artifact titled “macOS Secure Command Execution.” This deceptive guide instructs users to paste a base64-encoded command into their Terminal application, which decodes and runs a harmful script designed to download the MacSync information stealer malware.

After execution, the malware connects with its command-and-control server at a2abotnet[.]com/dynamic using predefined authentication credentials. To avoid detection, it disguises its network traffic as normal web browsing by mimicking legitimate macOS browser User-Agent strings. The payload then retrieves an AppleScript component responsible for extracting sensitive data like keychain information, browser data, and cryptocurrency wallet details.

Data Exfiltration Techniques

According to cybersecurity experts at Moonlock Lab, the stolen data is compressed and saved in /tmp/osalogging.zip before being sent to a2abotnet[.]com/gate through HTTP POST requests. The malware incorporates advanced retry strategies for managing large data transfers, including chunked uploads with up to eight retries and exponential backoff. Upon successful data transfer, it deletes the staging files to avoid leaving traces.

The second variant of the attack targets users searching for “macos cli disk space analyzer” through a Medium article hosted at apple-mac-disk-space.medium[.]com. This article pretends to be from Apple’s official Support Team and uses the same ClickFix social engineering technique, albeit with double-layered encoding and a different hosting setup. The malicious command cleverly uses string concatenation (cur””l instead of curl) to evade pattern-based detection systems.

Growing Threats and Precautionary Measures

These attack variants underscore the rising trend of cybercriminals abusing legitimate platforms and trusted services to spread malware. The use of Google Ads in malware distribution emphasizes the crucial need for verifying the authenticity of sources, even when they appear in sponsored search results. MacOS users are strongly advised to refrain from executing terminal commands from unfamiliar sources and to verify the authenticity of support articles claiming to be from Apple or other reputable vendors.

Organizations should deploy endpoint detection solutions capable of monitoring suspicious terminal activity and network connections to unverified command-and-control servers. Staying informed about cybersecurity threats is essential for protection, and users are encouraged to follow updates on reliable platforms.

Cyber Security News Tags:Claude AI, cyber attacks, Cybersecurity, data theft, Google Ads, macOS, Malware, Medium, online safety, Security, Threat Actors

Post navigation

Previous Post: Critical OpenSea Exploit Chain for Sale on Dark Web

Related Posts

Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Cyber Security News
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel Cyber Security News
Automatic BitLocker Encryption May Silently Lock Away Your Data Automatic BitLocker Encryption May Silently Lock Away Your Data Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Phishing Scheme Exploits Dropbox to Steal User Credentials Phishing Scheme Exploits Dropbox to Steal User Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • macOS Users Targeted by Malware via Google Ads
  • Critical OpenSea Exploit Chain for Sale on Dark Web
  • Critical SQL Injection Flaw in Microsoft Manager Alerted by CISA
  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • macOS Users Targeted by Malware via Google Ads
  • Critical OpenSea Exploit Chain for Sale on Dark Web
  • Critical SQL Injection Flaw in Microsoft Manager Alerted by CISA
  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News