Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

April 11, 2026

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

April 11, 2026

Google Chrome Rolls Out Protection Against Infostealers

April 11, 2026
Facebook X (Twitter) Instagram
Saturday, April 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings
News

Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings

Team-CWDBy Team-CWDApril 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A malware campaign which targets macOS systems, distributed using a ClickFix attack, has evolved to exploit Script Editor as the execution vector rather than the typical Terminal-based point of execution.

Identified by researchers at Jamf Threat Labs, the campaign is designed to deliver an Atomic Stealer (AMOS), an infostealer and backdoor which is specifically designed to target MacOS operating systems.

The campaign appears to be a direct response to an Apple OS update which now warns users that they may be unwittingly helping cybercriminals install malware via a ClickFix attack.

ClickFix, is social engineering technique which uses dialogue boxes that contain fake instructions or verification messages, to trick people into copying, pasting and running malicious code on their own device.

Typically, when ClickFix attacks target MacOS, they prompt the user to enter commands in the macOS Terminal under the guise of troubleshooting or maintenance.

Instead, this new AMOS variant uses a browser-triggered workflow to launch Script Editor, which is where the user is encouraged to enter the commands.

A New Method to Avoid MacOS Security Warnings

Apple attempted to counter ClickFix attacks in the macOS 26.4 update by introducing a security feature that scans commands pasted into Terminal before they’re executed and warns the user that the command could be malicious.

The Atomic Stealer campaign has shifted to exploit Script Editor because the attackers are attempting to get around potential victims seeing these warnings in the Terminal.

“It’s a meaningful friction point, but as this campaign illustrates, when one door closes, attackers find another,” Thijs Xhaflaire, senior threat and detections researcher at Jamf Threat Labs said in a blog post, published on April 8.

The Atomic Stealer campaigned detailed by Jamf presented potential victims with a full window in their browser which claimed to be from Apple, with advice on how to reclaim disk space on a Mac.

The method used to lure potential victims to these sites is not detailed, but typically similar ClickFix campaigns have relied on malicious links or malvertising.

The user is asked to follow step-by-step instructions to supposedly reclaim the disk space on their Mac, which leads them to open Script Editor and paste in what are in fact malicious commands which execute the malware payload and infect the victim’s system.

“By shifting execution from Terminal to Script Editor, the attacker preserves a familiar delivery mechanism while quietly changing how and where the command actually runs. It’s a small adjustment with a meaningful impact,” said Xhaflaire.

ClickFix has become one of the most popular vectors for cybercriminals to distribute malware and phishing arracks.

Actions which network administrators can take to help prevent users from falling victim include restricting use of run dialog and clipboard, restricting execution of potentially malicious executables and blocking access to potentially malicious adverts and websites.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleClaude Code Source Leaked via npm Packaging Error, Anthropic Confirms
Next Article Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Team-CWD
  • Website

Related Posts

News

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

April 11, 2026
News

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

April 11, 2026
News

Google Chrome Rolls Out Protection Against Infostealers

April 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.