A sophisticated new malware campaign targeting macOS users has emerged, employing deceptive “Clickfix” tactics to distribute malicious AppleScripts designed to harvest sensitive user credentials and financial data. Unlike traditional malware that relies on software vulnerabilities, this campaign exploits human psychology by presenting users with familiar-looking security prompts that appear to be routine verification procedures. The campaign leverages typosquatted domains that closely mimic legitimate finance platforms and Apple App Store websites, creating a convincing facade that tricks users into executing dangerous commands on their systems. When users visit the malicious domains, they encounter professionally designed pages that replicate the appearance of legitimate CAPTCHA verification systems. This technique allows the malware to confirm password validity without triggering system alerts or user suspicion, demonstrating the attackers’ deep understanding of macOS security mechanisms. These seemingly legitimate verification pages instruct macOS users to copy and paste Base64-encoded commands into their terminal applications to prove they are not robots. The malware demonstrates a clear preference for targeting users in Western countries, particularly the United States and European Union, while conspicuously avoiding victims in Commonwealth of Independent States nations. To validate stolen credentials silently, it leverages the macOS dscl command with the authonly parameter, ensuring the verification process remains hidden from the user. The attack begins when users inadvertently visit malicious domains that present fake Cloudflare-style CAPTCHA prompts. Once executed, these commands initiate a comprehensive data theft operation that targets browser credentials, cryptocurrency wallets, and sensitive personal information stored across multiple applications. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis.
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 27 Jun 2025 10:25:13 +0000