Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Lumma Stealer Developers Doxxed – Infosecurity Magazine

October 22, 2025

WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

October 22, 2025

Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware

October 21, 2025
Facebook X (Twitter) Instagram
Wednesday, October 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi
Cyber Security

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

Team-CWDBy Team-CWDSeptember 7, 2025Updated:September 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new Atomic macOS Stealer (AMOS) campaign is targeting macOS users by disguising the malware as “cracked” versions of legitimate apps, Trend Micro researchers have warned.

The campaign is designed to help cybercriminals overcome recent Apple security improvements, representing “significant tactical adaptation,” the researchers found.

“While macOS Sequoia’s enhanced Gatekeeper protections successfully blocked traditional .dmg-based infections, threat actors quickly pivoted to terminal-based installation methods that proved more effective in bypassing security controls,” they noted.

Victims are lured into installing the infostealer via social engineering techniques – either downloading a malicious .dmg installer masquerading as a cracked app or, after being asked to copy and paste commands into the macOS terminal, resembling the fake CAPTCHA technique.

Once installed, AMOS establishes persistence before stealing sensitive data from the victim’s system. This includes credentials, browser data, cryptocurrency wallets, Telegram chats, VPN profiles, keychain items, Apple Notes and files from common folders.   

AMOS’ Infection Chain and Delivery

The Trend Micro report, published on September 4, observed that the attackers attempt to gain initial access to systems through cracked software downloads.

Affected users visited the website haxmac[.]cc several times. This URL hosts several cracked software programs for macOS.

In the cases analyzed, the users specifically searched for and downloaded “CleanMyMac” on their machines. This is a legitimate program that can be downloaded from the Mac App Store.

“However, downloading the program from an untrusted source, as seen in these cases, puts the machine and the organization at risk because these cracked programs might be bundled with malware or trojanized by threat actors,” the researchers noted.

After downloading the cracked software, victims are redirected to AMOS’ landing page, prompting them to click “Download for MacOS” or instructed to copy and paste malicious commands into the Apple Terminal.

This page appears to perform OS fingerprinting, determining whether the visitor is using Windows or MacOS before redirecting them to the corresponding payload page.

A number of different domains were observed to act as redirectors, while the redirect destination changes with each visit to help bypass detection. However, the instructions on the pages remain identical.

Additionally, the threat actor uses frequent domain and URL rotation for their download commands, likely to evade static URL-based detections and takedowns.

“As a result, the domains and URLs are expected to change over time,” the researchers said.

Both of these actions lead to the execution of a malicious installation script. This script downloads an AppleScript file “update” to the temp directory.

A script ‘com.finder.helper.plist’ file configures a MacOS LaunchDaemon to continuously run the ‘. agent’ script, which then runs in an infinite loop to detect the logged-in user and execute the hidden binary.

The binary file establishes persistence by retrieving the username of the currently logged-in user, excluding root.

Once the script is executed, it copies sensitive data from the compromised system.

The researchers said that the type of information stolen by AMOS poses significant downstream risks for businesses as well as the individuals targeted. This includes credential stuffing, financial theft or further intrusions into enterprise systems.

The researchers urged organizations to deploy defense-in-depth strategies that don’t rely solely on built-in operating system protections to protect against the tactics used in this campaign.

Image credit: IgorGolovniov / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCan Your Security Stack See ChatGPT? Why Network Visibility Matters
Next Article North Korean Hackers Exploit Threat Intel Platforms For Phishing
Team-CWD
  • Website

Related Posts

Cyber Security

Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack

October 20, 2025
Cyber Security

The CISO’s Crucible – Finding Strength in Control

October 17, 2025
Cyber Security

F5 Reveals Nation State Breach and Urges Immediate Patching

October 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

What is it, and how do I get it off my device?

September 11, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.