Mac Infostealer ‘Shamos’ Spreads via ClickFix Attacks Masquerading as Help

by | Aug 25, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

New macOS Infostealer ‘Shamos’ Spreads Through ClickFix Attacks

A new infostealer malware named Shamos is targeting macOS devices through ClickFix attacks that impersonate troubleshooting guides and fixes.

The malware, a variant of the Atomic macOS Stealer (AMOS), was developed by the cybercriminal group COOKIE SPIDER and is designed to steal sensitive information, including browser credentials, Keychain items, Apple Notes, and cryptocurrency wallets.

CrowdStrike, which discovered the malware, reports attempted infections against over 300 monitored environments worldwide since June 2025.


Malvertising and Fake GitHub Repositories

Shamos is delivered through malvertising campaigns and fake GitHub repositories posing as legitimate troubleshooting resources.

Malicious GitHub repositoryMalicious GitHub repository
Source: CrowdStrike

These lures direct victims to websites like mac-safer[.]com and rescue-mac[.]com, which provide fake instructions urging users to copy-paste shell commands into the Terminal to fix common macOS problems.

Malicious sponsored results on Google SearchMalicious sponsored results on Google Search
Source: CrowdStrike

Instead of solving anything, the commands:

  • Decode a Base64-encoded URL
  • Fetch a malicious Bash script
  • Steal the user’s password
  • Download and execute the Shamos Mach-O binary

 

False instructions on fixing printer issues on macOSFalse instructions for fixing printer issues on macOS
Source: CrowdStrike

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Bypassing macOS Defenses

The malicious script leverages:

  • xattr → Removes quarantine flags to bypass Gatekeeper
  • chmod → Makes the malware executable

Once installed, Shamos runs anti-VM checks to avoid sandbox detection and executes AppleScript commands to gather system and host information.


Data Theft and Persistence

Shamos collects and exfiltrates sensitive data including:

  • Cryptocurrency wallet files
  • Apple Keychain data
  • Apple Notes content
  • Browser-stored credentials

The stolen data is compressed into out.zip and transmitted via curl to the attacker’s server.

If run with sudo privileges, Shamos creates a LaunchDaemon Plist file (com.finder.helper.plist) in the user’s system, enabling persistence on reboot.

Additionally, it can download extra payloads, such as a spoofed Ledger Live wallet app or a botnet module, further expanding its capabilities.




ClickFix Attacks: A Growing Malware Delivery Trend

ClickFix attacks trick users into executing malicious commands under the guise of fixing errors or installing updates. Recently, they’ve been seen in:

  • TikTok videos
  • Fake captcha challenges
  • Phony Google Meet fixes
  • Ransomware delivery campaigns
  • State-sponsored attacks

This highlights the rising popularity of ClickFix as an initial infection vector.


How to Stay Safe

Mac users should:

  1. Avoid executing Terminal commands from untrusted sources, especially those found in ads or random repositories.
  2. Steer clear of sponsored results when searching for troubleshooting help.
  3. Use Apple’s official Support forums or the built-in macOS Help tool (Cmd + Space → “Help”) for guidance.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This