{"id":45285,"date":"2026-04-10T01:49:38","date_gmt":"2026-04-09T17:49:38","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings-infosecurity-magazine\/"},"modified":"2026-04-10T01:49:38","modified_gmt":"2026-04-09T17:49:38","slug":"atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/atomic-stealer-macos-clickfix-attack-bypasses-apple-security-warnings-infosecurity-magazine\/","title":{"rendered":"Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>A malware campaign which targets macOS systems, distributed using a ClickFix attack, has evolved to exploit Script Editor as the execution vector rather than the typical Terminal-based point of execution.<\/p>\n<p>Identified by researchers at Jamf Threat Labs, the campaign is designed to deliver an <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/macos-infostealer-amos-backdoor\/\">Atomic Stealer<\/a> (AMOS), an <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/guide-infostealer-malware.html\">infostealer<\/a> and backdoor which is specifically designed to target MacOS operating systems.<\/p>\n<p>The campaign appears to be a direct response to an Apple OS update which now warns users that they may be unwittingly helping cybercriminals install malware via a <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/what-is-clickfix-how-prevent.html\">ClickFix<\/a> attack.<\/p>\n<p>ClickFix, is&nbsp;<a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/hacking-your-brain-top-13-social-engineering-techniques.html\">social engineering<\/a>&nbsp;technique which uses dialogue boxes that contain fake instructions or verification messages, to trick people into copying, pasting and running malicious code on their own device.<\/p>\n<p>Typically, when ClickFix attacks target MacOS, they prompt the user to enter commands in the macOS Terminal under the guise of troubleshooting or maintenance.<\/p>\n<p>Instead, this new AMOS variant uses a browser-triggered workflow to launch Script Editor, which is where the user is encouraged to enter the commands.<\/p>\n<h2><strong>A New Method to Avoid MacOS Security Warnings<\/strong><\/h2>\n<p>Apple attempted to counter ClickFix attacks in the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/apple-rcs-encryption-memory\/\">macOS 26.4 update<\/a> by introducing a security feature that scans commands pasted into Terminal before they&#39;re executed and warns the user that the command could be malicious.<\/p>\n<p>The Atomic Stealer campaign has shifted to exploit Script Editor because the attackers are attempting to get around potential victims seeing these warnings in the Terminal.<\/p>\n<p>&ldquo;It&#39;s a meaningful friction point, but as this campaign illustrates, when one door closes, attackers find another,&rdquo; Thijs Xhaflaire, senior threat and detections researcher at Jamf Threat Labs said in a blog post, <a href=\"https:\/\/www.jamf.com\/blog\/clickfix-macos-script-editor-atomic-stealer\/\">published on April 8<\/a>.<\/p>\n<p>The Atomic Stealer campaigned detailed by Jamf presented potential victims with a full window in their browser which claimed to be from Apple, with advice on how to reclaim disk space on a Mac.<\/p>\n<p>The method used to lure potential victims to these sites is not detailed, but typically similar ClickFix campaigns have relied on malicious links or <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ncsc-publishes-tips-tackle\/\">malvertising<\/a>.<\/p>\n<p>The user is asked to follow step-by-step instructions to supposedly reclaim the disk space on their Mac, which leads them to open Script Editor and paste in what are in fact malicious commands which execute the malware payload and infect the victim&rsquo;s system.<\/p>\n<p>&ldquo;By shifting execution from Terminal to Script Editor, the attacker preserves a familiar delivery mechanism while quietly changing how and where the command actually runs. It&#39;s a small adjustment with a meaningful impact,&rdquo; said Xhaflaire.<\/p>\n<p>ClickFix has become one of the most popular vectors for <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/clickfix-attacks-surge-2025\/\">cybercriminals to distribute malware and phishing arracks<\/a>.<\/p>\n<p>Actions which network administrators can take to help prevent users from falling victim include restricting use of run dialog and clipboard, restricting execution of potentially malicious executables and blocking access to potentially malicious adverts and websites.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A malware campaign which targets macOS systems, distrib [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45285","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45285"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45285\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}