Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer

Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer

Posted on December 10, 2025December 11, 2025 By CWS

Menace actors at the moment are leveraging the belief customers place in AI platforms like ChatGPT and Grok to distribute the Atomic macOS Stealer (AMOS).

A brand new marketing campaign found by Huntress on December 5, 2025, reveals that attackers have moved past mimicking trusted manufacturers to actively using authentic AI providers to host malicious payloads.​

The an infection chain begins with a routine Google search. Customers querying widespread troubleshooting phrases similar to “Clear disk house on macOS” are offered with high-ranking outcomes that look like useful guides hosted on authentic domains: chatgpt.com and grok.com.

AI outcomes on search

In contrast to conventional website positioning poisoning, which directs victims to compromised web sites, these hyperlinks result in precise, shareable conversations on OpenAI and xAI platforms.​

As soon as the consumer clicks the hyperlink, they’re offered with a professional-looking troubleshooting information. The dialog, generated by the attacker, instructs the consumer to open the macOS Terminal and copy-paste a particular command to “safely clear system knowledge.”

Weaponized Dialog

As a result of the recommendation seems to return from a trusted AI assistant on a good area, customers typically bypass their ordinary safety skepticism.​

ChatGPT and Grok Conversations Weaponized

In response to Huntress’ evaluation, the executed command doesn’t obtain a standard file that might set off macOS Gatekeeper warnings. As an alternative, it executes a base64-encoded script that downloads a variant of the AMOS stealer.​

The malware employs a “living-off-the-land” method to reap credentials and not using a graphical immediate. It makes use of the native dscl utility to validate the consumer’s password silently within the background.

As soon as validated, the password is piped into sudo -S to grant root privileges, permitting the malware to put in persistence mechanisms and exfiltrate knowledge with out additional consumer interplay.​

The next artifacts and behaviors have been recognized as key indicators of this marketing campaign:​

CategoryIndicator / BehaviorContextPersistence/Library/LaunchDaemons/com.finder.helper.plistA hidden executable was dropped within the consumer’s dwelling listing.File Path/Customers/$USER/.helperUsed to validate captured credentials with out GUI prompts silently.File Path/tmp/.passTemporary file used to retailer the plaintext password throughout escalation.Commanddscl -authonly Used to silently validate captured credentials with out GUI prompts.Commandsudo -SUsed to just accept the password by way of normal enter for root entry.NetworkLaunchDaemon is created for persistence.Recognized C2 URL for the preliminary payload supply (Base64 decoded).

This marketing campaign is perilous as a result of it exploits “behavioral belief” moderately than technical vulnerabilities. The assault circumvents conventional defenses like Gatekeeper as a result of the consumer explicitly authorizes the command within the Terminal.​

Safety groups are suggested to observe for anomalous osascript execution and weird dscl utilization, notably when related to curl instructions.

For finish customers, the first protection is behavioral: authentic AI providers is not going to request that customers execute opaque, encoded Terminal instructions for routine upkeep duties.

The shift to utilizing trusted AI domains as internet hosting infrastructure introduces a brand new chokepoint for defenders, who should now scrutinize site visitors to these platforms for malicious patterns.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actors, AMOS, ChatGPT, Conversations, Deploy, Grok, Stealer, Threat, Weaponize

Post navigation

Previous Post: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
Next Post: Fortinet Patches Critical Authentication Bypass Vulnerabilities

Related Posts

CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News
Claude Code Flaws Risk Remote Code Attacks Claude Code Flaws Risk Remote Code Attacks Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials Cyber Security News
ASP.NET Developers Targeted by Malicious NuGet Packages ASP.NET Developers Targeted by Malicious NuGet Packages Cyber Security News
Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark