Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Reading Time: 2 mins read
in Alerts
Chrome Extensions Leak Data And API Keys

A sophisticated new malware campaign has been identified targeting macOS users with a dangerous variant of the Atomic macOS Stealer (AMOS). The operation utilizes typo-squatted domains that convincingly mimic the major U.S. telecommunications provider Spectrum to lure potential victims. This attack is cleverly disguised as a routine CAPTCHA verification system, representing a significant escalation in cross-platform social engineering tactics that put both consumer and corporate users at risk. The campaign leverages the increasingly popular Clickfix method, presenting users with fake security verification pages designed to look like legitimate Cloudflare protection screens to initiate the infection process.

The attack vector relies on deceiving users who land on fraudulent websites such as panel-spectrum.net. After being presented with what appears to be a standard human verification challenge, users are prompted to click an “Alternative Verification” button. This action triggers a malicious sequence that copies harmful commands to the user’s clipboard, while displaying on-screen instructions that guide the user to execute them. Researchers at CloudSEK, who uncovered this campaign, revealed that the threat is multi-platform in nature, delivering different payloads depending on the victim’s operating system. macOS users receive particularly dangerous shell scripts intended to harvest system credentials and download the AMOS malware for further exploitation.

The infection mechanism on macOS systems demonstrates remarkable sophistication in exploiting the operating system’s security architecture. When users follow the deceptive on-screen instructions to “verify” themselves, they inadvertently execute a downloaded shell script that begins an insidious credential harvesting routine. The script uses macOS’s native dscl command to repeatedly prompt for and validate the user’s system password until the correct one is entered and captured. Once the correct password is stolen, the malware uses it with sudo privileges to remove Apple’s quarantine attributes from the AMOS payload, effectively bypassing Gatekeeper security protections before executing the malicious stealer software.

While definitive attribution of the campaign remains unclear, the presence of Russian-language comments discovered within the source code suggests the possible involvement of Russian-speaking cybercriminals. Despite the sophisticated social engineering, the campaign exhibits several technical flaws, including mismatched instructions and inconsistent command delivery, indicating that the attackers may have used hastily assembled infrastructure. The primary danger of this attack lies in its exploitation of user trust in familiar online interactions like CAPTCHAs, turning a routine process into a self-infection vector. Cybersecurity experts urge extreme vigilance, as legitimate websites will almost never require users to manually copy and execute scripts.

Reference:

  • macOS Users Targeted By New AMOS Stealer Hidden In Fake CAPTCHA Screens
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial