{"id":45236,"date":"2026-04-09T02:59:27","date_gmt":"2026-04-08T18:59:27","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack\/"},"modified":"2026-04-09T02:59:27","modified_gmt":"2026-04-08T18:59:27","slug":"new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/09\/new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack\/","title":{"rendered":"New macOS stealer campaign uses Script Editor in ClickFix attack"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2021\/10\/22\/Apple_Finder_Mac__headpic.jpg\" width=\"1600\" alt=\"New macOS stealer campaign uses Script Editor in ClickFix attack\"><\/p>\n<p>A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix attack that tricked users into executing commands in Terminal.<\/p>\n<p>Script Editor is a built-in macOS application for writing and running scripts, primarily AppleScript and JXA, that can execute local scripts and shell commands. It is a trusted application pre-installed on macOS systems.<\/p>\n<p>While this is not the first time it has been abused for malware delivery, the researchers note that, in the context of the ClickFix social engineering technique, it does not require the victim to manually interact with the Terminal and execute commands.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"New macOS stealer campaign uses Script Editor in ClickFix attack\"><\/a> <\/div>\n<p>Apart from the Terminal-based variant being widely reported, macOS Tahoe 26.4 added <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-adds-macos-terminal-warning-to-block-clickfix-attacks\/\" rel=\"nofollow noopener\">protection against ClickFix<\/a> attacks in the form of a warning when trying to execute commands.<\/p>\n<p>In a new campaign distributing Atomic Stealer observed by <a href=\"https:\/\/www.jamf.com\/blog\/clickfix-macos-script-editor-atomic-stealer\/\" rel=\"nofollow noopener\">security researchers at Jamf<\/a>, the hackers target victims with fake Apple-themed sites that pose as guides to help reclaim disk space on their Mac computers.<\/p>\n<p>These pages contain legitimate-looking system cleanup instructions but use the applescript:\/\/ URL scheme to launch Script Editor with a pre-filled executable code.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"584\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/prompt.jpg\" width=\"800\" alt=\"New macOS stealer campaign uses Script Editor in ClickFix attack\"><figcaption><strong>Prompt to open the Script Editor by the malicious web page<\/strong><br \/><em>Source: Jamf<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The malicious code runs an obfuscated &lsquo;curl | zsh&rsquo; command, which downloads and executes a script directly in system memory.<\/p>\n<p>This decodes a base64 + gzip payload, downloads a binary (\/tmp\/helper), removes security attributes via &lsquo;xattr -c,&rsquo; makes it executable, and runs it.<\/p>\n<p>The final payload is a Mach-O binary identified as Atomic Stealer (AMOS), a commodity malware-as-a-service that has been <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware\/\" rel=\"nofollow noopener\">extensively deployed<\/a> in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-ads-for-shared-chatgpt-grok-guides-push-macos-infostealer-malware\/\" rel=\"nofollow noopener\">ClickFix campaigns<\/a> using various lures over the past year.<\/p>\n<p>The malware targets a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-atomic-macos-info-stealing-malware-targets-50-crypto-wallets\/\" rel=\"nofollow noopener\">broad spectrum<\/a> of sensitive data, including information stored in the Keychain, desktop, and browser cryptocurrency wallet extensions, browser autofill data, passwords, cookies, stored credit cards, and system information.<\/p>\n<p>Last year, AMOS also <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/atomic-macos-infostealer-adds-backdoor-for-persistent-attacks\/\" rel=\"nofollow noopener\">added a backdoor<\/a> component to give operators persistent access to compromised systems.<\/p>\n<p>Mac users should treat Script Editor prompts as high-risk and avoid running them on their devices unless they fully understand what they do and trust the resource.<\/p>\n<p>For macOS troubleshooting guides, it is recommended to rely only on official documentation from Apple.<\/p>\n<p>Apple Support Communities, the forum where Apple customers can help each other with advice, although it may not be risk-free.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-macos-stealer-campaign-uses-script-editor-in-clickfix-attack\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"New macOS stealer campaign uses Script Editor in ClickFix attack\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures\/\">New Infinity Stealer malware grabs macOS data via ClickFix lures<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware\/\">Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-adds-macos-terminal-warning-to-block-clickfix-attacks\/\">Apple adds macOS Terminal warning to block ClickFix attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/suspected-redline-infostealer-administrator-extradited-to-us\/\">Suspected RedLine infostealer malware admin extradited to US<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets\/\">New Torg Grabber infostealer malware targets 728 crypto wallets<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new campaign delivering the Atomic Stealer malware to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45236","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45236"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45236\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}