Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Infostealer Hits macOS Users Widely

September 22, 2025
Reading Time: 3 mins read
in Alerts
FBI Issues Warning on Spoofed IC3 Website

A widespread, ongoing campaign is targeting macOS users by impersonating well-known brands to deliver information-stealing malware. These threat actors create fraudulent GitHub repositories that claim to offer legitimate software from various companies. To ensure these fake pages are easily found, the attackers rely on search engine optimization (SEO) techniques, causing their malicious links to appear at the top of search results and increasing the likelihood of a successful attack. Once a user clicks on the link, they are redirected to a site that delivers malware designed to steal sensitive data. This deceptive approach leverages the trust users have in both established brands and popular platforms like GitHub.

LastPass recently fell victim to this campaign, with attackers creating two GitHub sites impersonating the password management company. The fake repositories, posted by a user with a suspicious name, contained links that promised to install “LastPass on MacBook.” However, these links actually redirected users to a malicious page that instructed them to copy and paste a command into a terminal window. This command was a CURL request that downloaded a malicious payload to the computer’s temporary directory. This method highlights the attacker’s use of social engineering to convince users to take actions that compromise their own security.

The payload delivered in this attack was the Atomic macOS Stealer (AMOS), a notorious information stealer that has been active since 2023. AMOS is capable of stealing a wide range of sensitive data from an infected computer. LastPass researchers have also observed these same threat actors impersonating a variety of other businesses, including financial institutions, other password managers, technology companies, and even cryptocurrency wallets. The attackers are versatile, adapting their targets to maximize their potential for success and profit.

To avoid detection and maintain the longevity of their campaign, the threat actors use multiple GitHub usernames to create their fake pages. These pages often follow a similar naming pattern that combines the targeted company’s name with Mac-related terminology, making them seem more legitimate to unsuspecting users. This pattern has been observed in attacks dating back to at least July, when another security researcher warned about a similar campaign targeting Homebrew users. These attacks, which delivered malicious payloads in the background while installing the official application, show a clear strategy of exploiting user trust in both Google Ads and GitHub to hide their malicious activity.

This ongoing campaign underscores the importance of exercising caution when downloading software, even from seemingly trustworthy sources. The attackers are not only impersonating brands but also using search engine optimization to boost their malicious links. Users should be vigilant, carefully scrutinizing URLs and sources before downloading any software or executing commands. Sticking to official app stores or a company’s verified website for downloads is the best way to avoid falling victim to these types of sophisticated and widespread attacks.

Reference:

  • Widespread infostealer campaign now actively targeting macOS users worldwide
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

FBI Issues Warning on Spoofed IC3 Website

FBI Issues Warning on Spoofed IC3 Website

September 22, 2025
FBI Issues Warning on Spoofed IC3 Website

SonicWall Warns Reset After Exposure

September 22, 2025
Steganography Cloud C2 In Modular Chain

Steganography Cloud C2 In Modular Chain

September 19, 2025
Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

September 19, 2025
Steganography Cloud C2 In Modular Chain

SEO Poisoning Hits Chinese Users

September 19, 2025
Apple Backports Fix For Exploited Bug

Apple Backports Fix For Exploited Bug

September 18, 2025

Latest Alerts

SonicWall Warns Reset After Exposure

Infostealer Hits macOS Users Widely

FBI Issues Warning on Spoofed IC3 Website

Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

SEO Poisoning Hits Chinese Users

Subscribe to our newsletter

    Latest Incidents

    Steam Game Steals Streamer Donations

    Ransomware Gang Hacks Spartanburg County

    Cyberattack Hits Europe Airport Systems

    Russian Hackers Hit Polish Hospitals

    New York Blood Center Data Breach

    Tiffany Data Breach Hits Thousands

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial