Security

ClickFix macOS Campaign Delivers Infostealers

3 min read

Summary

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Need help with Security?Talk to an Expert

Introduction

Microsoft is tracking an evolving ClickFix campaign that now targets macOS users through fake troubleshooting content and bogus utility installation instructions. This matters because the attack shifts away from traditional app downloads and instead abuses Terminal commands, helping attackers avoid some of the protections users expect from standard macOS application installs.

What’s new

Microsoft says threat actors are posting fake macOS advice on standalone websites, Medium, Craft, and similar user-driven platforms. The lures often claim to help with common issues such as freeing disk space or fixing system problems.

Key changes in this campaign include:

  • Users are instructed to paste Base64-encoded or obfuscated commands into Terminal
  • The commands retrieve remote content and launch script-based loaders
  • Attackers use native tools like curl, osascript, and shell interpreters
  • This method avoids the normal Gatekeeper-style checks applied to app bundles opened in Finder
  • Payloads observed include Macsync, SHub Stealer, and AMOS

Microsoft also identified three execution paths:

  • Loader install campaign
  • Script install campaign
  • Helper install campaign

Across these variants, the objective is consistent: collect credentials and sensitive files, establish persistence, and exfiltrate data.

Why it matters for IT admins

The malware goes beyond simple credential theft. According to Microsoft, these infostealers can collect:

  • Keychain entries
  • iCloud account data
  • Browser credentials
  • Telegram data
  • Media and documents
  • Cryptocurrency wallet data

Some variants also replace legitimate crypto wallet apps with trojanized versions, increasing the risk of financial theft.

For security teams, the bigger concern is user-driven execution. Because the victim manually runs commands in Terminal, attackers reduce dependence on malicious app packages and increase the chance of successful compromise.

Administrators and security teams should take the following steps:

  • Educate users not to paste commands into Terminal from blogs, forums, or troubleshooting pages
  • Monitor for suspicious use of curl, osascript, shell interpreters, and unexpected LaunchAgent or LaunchDaemon creation
  • Investigate staging paths such as /tmp/shub_<random ID> and unusual archive creation in /tmp
  • Review detections for data exfiltration, credential prompts, and persistence tied to fake update services
  • Prioritize protection for crypto-related apps and sensitive user data stores like Keychain

Bottom line

This ClickFix macOS campaign shows how social engineering is adapting to bypass traditional app-based defenses. For defenders, user awareness, endpoint monitoring, and detection of suspicious script execution are now critical to stopping these infostealer chains before data is stolen.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

macOS securityClickFixinfostealerMicrosoft Defendermalware

Related Posts

Security

AiTM Phishing Campaign Targets Microsoft 365 Users

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.

Security

CVE-2026-31431 Linux Root Escalation Threat Explained

Microsoft has detailed CVE-2026-31431, a high-severity Linux local privilege escalation flaw that can grant root access across major distributions and cloud-hosted workloads. The issue matters because it affects shared-kernel environments such as containers and Kubernetes, increasing the risk of container escape, lateral movement, and host compromise if systems are not patched quickly.

Security

Microsoft Agent 365 GA Adds Security and AI Controls

Microsoft Agent 365 is now generally available for commercial customers, giving IT and security teams a unified control plane to observe, govern, and secure AI agents across Microsoft 365, endpoints, and cloud environments. New preview capabilities also extend visibility to shadow AI, local Windows agents, multicloud agent platforms, and policy-based controls through Defender and Intune.

Security

Email Threat Landscape Q1 2026: Key Microsoft Insights

Microsoft reports 8.3 billion phishing emails detected in Q1 2026, with QR code phishing more than doubling and CAPTCHA-gated campaigns evolving quickly. The findings matter for security teams because attackers are shifting toward link-based credential theft, while disruption efforts against Tycoon2FA show coordinated action can reduce phishing impact.

Security

Microsoft Security Updates: Agent 365 and Defender

Microsoft has announced new security capabilities across Agent 365, Defender for Cloud, GitHub Advanced Security, and Microsoft Purview. The updates focus on improving visibility into AI agent activity, strengthening code-to-runtime protection, and accelerating data security investigations for security and IT teams.

Security

CISO Risk Reviews: 8 Microsoft Security Best Practices

Microsoft has published a practical framework for CISOs and security leaders to run more effective risk reviews amid rising AI-enabled cyberthreats. The guidance focuses on eight review areas—from assets and applications to authentication, authorization, and network isolation—to help organizations shift from reactive response to proactive risk reduction.