MacSync Infostealer Lures Mac Users Through ClickFix Social-Engineering Campaigns

1 min read
Source: The Hacker News
MacSync Infostealer Lures Mac Users Through ClickFix Social-Engineering Campaigns
Photo: The Hacker News
TL;DR Summary

Three ClickFix campaigns have been found delivering the macOS infostealer MacSync by tricking users into pasting Terminal commands to download and run a shell script that fetches the payload and exfiltrates credentials, keychains, and seed phrases. The campaigns (Nov 2025 using OpenAI Atlas bait via Google ads; Dec 2025 via ChatGPT-related pages; Feb 2026 with a new variant) rely on social-engineering lures, malvertising, and trusted platforms to disguise malicious commands and payloads, with in-memory AppleScript execution to evade detection. Defenders are urged to patch hosting platforms (e.g., WordPress), monitor for ClickFix/trojan lures, and maintain zero-trust principles as attackers adapt tactics.

Share this article

Reading Insights

Total Reads

1

Unique Readers

3

Time Saved

6 min

vs 7 min read

Condensed

93%

1,399100 words

Want the full story? Read the original article

Read on The Hacker News