Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Reading Time: 2 mins read
in Alerts
Chrome Extensions Leak Data And API Keys

A sophisticated new malware campaign has been identified targeting macOS users with a dangerous variant of the Atomic macOS Stealer (AMOS). The operation utilizes typo-squatted domains that convincingly mimic the major U.S. telecommunications provider Spectrum to lure potential victims. This attack is cleverly disguised as a routine CAPTCHA verification system, representing a significant escalation in cross-platform social engineering tactics that put both consumer and corporate users at risk. The campaign leverages the increasingly popular Clickfix method, presenting users with fake security verification pages designed to look like legitimate Cloudflare protection screens to initiate the infection process.

The attack vector relies on deceiving users who land on fraudulent websites such as panel-spectrum.net. After being presented with what appears to be a standard human verification challenge, users are prompted to click an “Alternative Verification” button. This action triggers a malicious sequence that copies harmful commands to the user’s clipboard, while displaying on-screen instructions that guide the user to execute them. Researchers at CloudSEK, who uncovered this campaign, revealed that the threat is multi-platform in nature, delivering different payloads depending on the victim’s operating system. macOS users receive particularly dangerous shell scripts intended to harvest system credentials and download the AMOS malware for further exploitation.

The infection mechanism on macOS systems demonstrates remarkable sophistication in exploiting the operating system’s security architecture. When users follow the deceptive on-screen instructions to “verify” themselves, they inadvertently execute a downloaded shell script that begins an insidious credential harvesting routine. The script uses macOS’s native dscl command to repeatedly prompt for and validate the user’s system password until the correct one is entered and captured. Once the correct password is stolen, the malware uses it with sudo privileges to remove Apple’s quarantine attributes from the AMOS payload, effectively bypassing Gatekeeper security protections before executing the malicious stealer software.

While definitive attribution of the campaign remains unclear, the presence of Russian-language comments discovered within the source code suggests the possible involvement of Russian-speaking cybercriminals. Despite the sophisticated social engineering, the campaign exhibits several technical flaws, including mismatched instructions and inconsistent command delivery, indicating that the attackers may have used hastily assembled infrastructure. The primary danger of this attack lies in its exploitation of user trust in familiar online interactions like CAPTCHAs, turning a routine process into a self-infection vector. Cybersecurity experts urge extreme vigilance, as legitimate websites will almost never require users to manually copy and execute scripts.

Reference:

  • macOS Users Targeted By New AMOS Stealer Hidden In Fake CAPTCHA Screens
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

Wing FTP Server RCE Flaw Exploited

WinRAR Zero-Day Exploit $80K on Dark Web

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Google Gemini Flaw Hijacks Email Summaries

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Wing FTP Server RCE Flaw Exploited

July 14, 2025
Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025

Latest Alerts

WinRAR Zero-Day Exploit $80K on Dark Web

Google Gemini Flaw Hijacks Email Summaries

Wing FTP Server RCE Flaw Exploited

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

Subscribe to our newsletter

    Latest Incidents

    Supermarket Cyberattack Prompts Warning

    China Hacker Suspected in DC Law Firm Breach

    nius.de Cyberattack Leaks User Data

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial