Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Reading Time: 2 mins read
in Alerts
Chrome Extensions Leak Data And API Keys

A sophisticated new malware campaign has been identified targeting macOS users with a dangerous variant of the Atomic macOS Stealer (AMOS). The operation utilizes typo-squatted domains that convincingly mimic the major U.S. telecommunications provider Spectrum to lure potential victims. This attack is cleverly disguised as a routine CAPTCHA verification system, representing a significant escalation in cross-platform social engineering tactics that put both consumer and corporate users at risk. The campaign leverages the increasingly popular Clickfix method, presenting users with fake security verification pages designed to look like legitimate Cloudflare protection screens to initiate the infection process.

The attack vector relies on deceiving users who land on fraudulent websites such as panel-spectrum.net. After being presented with what appears to be a standard human verification challenge, users are prompted to click an “Alternative Verification” button. This action triggers a malicious sequence that copies harmful commands to the user’s clipboard, while displaying on-screen instructions that guide the user to execute them. Researchers at CloudSEK, who uncovered this campaign, revealed that the threat is multi-platform in nature, delivering different payloads depending on the victim’s operating system. macOS users receive particularly dangerous shell scripts intended to harvest system credentials and download the AMOS malware for further exploitation.

The infection mechanism on macOS systems demonstrates remarkable sophistication in exploiting the operating system’s security architecture. When users follow the deceptive on-screen instructions to “verify” themselves, they inadvertently execute a downloaded shell script that begins an insidious credential harvesting routine. The script uses macOS’s native dscl command to repeatedly prompt for and validate the user’s system password until the correct one is entered and captured. Once the correct password is stolen, the malware uses it with sudo privileges to remove Apple’s quarantine attributes from the AMOS payload, effectively bypassing Gatekeeper security protections before executing the malicious stealer software.

While definitive attribution of the campaign remains unclear, the presence of Russian-language comments discovered within the source code suggests the possible involvement of Russian-speaking cybercriminals. Despite the sophisticated social engineering, the campaign exhibits several technical flaws, including mismatched instructions and inconsistent command delivery, indicating that the attackers may have used hastily assembled infrastructure. The primary danger of this attack lies in its exploitation of user trust in familiar online interactions like CAPTCHAs, turning a routine process into a self-infection vector. Cybersecurity experts urge extreme vigilance, as legitimate websites will almost never require users to manually copy and execute scripts.

Reference:

  • macOS Users Targeted By New AMOS Stealer Hidden In Fake CAPTCHA Screens
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

New Malware Uses Prompts To Trick AI Tools

Fake Job Offers Hide North Korean Malware

June 26, 2025
New Malware Uses Prompts To Trick AI Tools

New Malware Uses Prompts To Trick AI Tools

June 26, 2025
New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

June 26, 2025
OneClik Malware Attacks Energy Sector Firms

Hackers Abuse Trezor Support For Phishing

June 25, 2025
OneClik Malware Attacks Energy Sector Firms

FileFix Attack Turns Explorer Into Weapon

June 25, 2025
OneClik Malware Attacks Energy Sector Firms

OneClik Malware Attacks Energy Sector Firms

June 25, 2025

Latest Alerts

Fake Job Offers Hide North Korean Malware

New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

Hackers Abuse Trezor Support For Phishing

FileFix Attack Turns Explorer Into Weapon

OneClik Malware Attacks Energy Sector Firms

Subscribe to our newsletter

    Latest Incidents

    Resupply DeFi Protocol Hacked For $9.6M

    Cyberattack Hits South Tyrol Emergency Ops

    UK’s Glasgow City Council Hit By Cyberattack

    Columbia University Probes Major IT Outage

    Mainline Health Breach Hits 101,000 Patients

    Porto Nacional City Hall Hit by Ransomware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial