GPUGate Malware Campaign Targets IT Firms in Western Europe
Summary
Hide ▲
Show ▼
A sophisticated malware campaign, codenamed GPUGate, targets IT and software development companies in Western Europe, with recent expansions to macOS users. The campaign leverages Google Ads, SEO poisoning, and fake GitHub commits to deliver malware, including the Atomic macOS Stealer (AMOS) and Odyssey. The attack began in December 2024 and uses a 128 MB Microsoft Software Installer (MSI) to evade detection. The malware employs GPU-gated decryption and various techniques to avoid analysis and detection. The end goal is information theft and delivery of secondary payloads. The threat actors have native Russian language proficiency and use a cross-platform approach. The campaign has expanded to target macOS users through fake Homebrew, LogMeIn, and TradingView platforms. These platforms impersonate popular tools and use SEO poisoning to distribute the Atomic Stealer malware and Odyssey. The threat actors use multiple GitHub usernames to evade takedowns and deploy malware via Terminal commands. Similar tactics have been observed in previous campaigns using malicious Google Ads and public GitHub repositories. The AMOS malware now includes a backdoor component for persistent, stealthy access to compromised systems. The campaign impersonates over 100 software solutions, including 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion, Gemini, Audacity, Adobe After Effects, Thunderbird, and SentinelOne. The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025. A new AMOS infostealer campaign abuses Google search ads to lure users into Grok and ChatGPT conversations that lead to installing the AMOS malware on macOS. The campaign was first spotted by researchers at Kaspersky, with a more detailed report by Huntress. The ClickFix attack begins with victims searching for macOS-related terms, leading to malicious instructions in AI chats. The malicious instructions are hosted on legitimate LLM platforms and contain commands to install the malware. The base64-encoded URL decodes into a bash script that loads a fake password prompt dialog. The script validates, stores, and uses the provided password to execute privileged commands, including downloading and executing the AMOS infostealer. AMOS was first documented in April 2023 and is a malware-as-a-service (MaaS) operation targeting macOS systems exclusively. AMOS added a backdoor module earlier this year, allowing operators to execute commands, log keystrokes, and drop additional payloads. AMOS is dropped as a hidden file and scans for cryptocurrency wallets, browser data, macOS Keychain data, and files on the filesystem. Persistence is achieved via a LaunchDaemon running a hidden AppleScript that restarts the malware if terminated. Users are advised to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do. Kaspersky noted that asking ChatGPT if the provided instructions are safe reveals they are not.
Timeline
-
18.10.2025 18:02 1 articles · 1mo ago
New malware payloads AMOS and Odyssey target macOS developers
The campaign targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms. The campaign employs 'ClickFix' techniques to trick targets into executing commands in Terminal. The campaign uses Google Ads to drive traffic to malicious sites and promote them in Google Search results. The malicious sites feature convincing download portals for fake apps and instruct users to copy a curl command in their Terminal to install them. The commands fetch and decode an 'install.sh' file, which downloads a payload binary, removing quarantine flags and bypassing Gatekeeper prompts. The payload is either AMOS or Odyssey, executed on the machine after checking if the environment is a virtual machine or an analysis system. The malware invokes sudo to run commands as root and collects detailed hardware and memory information of the host. The malware manipulates system services like killing OneDrive updater daemons and interacts with macOS XPC services to blend its malicious activity with legitimate processes. The malware harvests sensitive information stored on the browser, cryptocurrency credentials, and exfiltrates to the command and control (C2).
Show sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
-
22.09.2025 22:44 1 articles · 2mo ago
Threat actors view Mac users as low-hanging fruit
The threat actors may view Mac users as a low-hanging fruit due to the perception that Macs face fewer malware threats. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025.
Show sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
-
22.09.2025 18:36 1 articles · 2mo ago
AMOS malware adds backdoor for persistent access
The Atomic (AMOS) malware now includes a backdoor component, giving attackers persistent, stealthy access to compromised systems. The AMOS malware is a malware-as-a-service operation available for $1,000/month.
Show sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
-
20.09.2025 10:07 3 articles · 2mo ago
GPUGate campaign expands to macOS users through fake GitHub repositories
The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign uses SEO poisoning to ensure the fake repositories are positioned well in search results. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025. The campaign now targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms.
Show sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
-
08.09.2025 18:02 6 articles · 3mo ago
GPUGate Malware Campaign Targets IT Firms in Western Europe
The campaign has targeted a range of companies across the technology and financial sectors, including LastPass. The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign uses SEO poisoning to ensure the fake repositories are positioned well in search results. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025. The campaign now targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms. A new AMOS infostealer campaign abuses Google search ads to lure users into Grok and ChatGPT conversations that lead to installing the AMOS malware on macOS. The campaign was first spotted by researchers at Kaspersky, with a more detailed report by Huntress. The ClickFix attack begins with victims searching for macOS-related terms, leading to malicious instructions in AI chats. The malicious instructions are hosted on legitimate LLM platforms and contain commands to install the malware. The base64-encoded URL decodes into a bash script that loads a fake password prompt dialog. The script validates, stores, and uses the provided password to execute privileged commands, including downloading and executing the AMOS infostealer. AMOS was first documented in April 2023 and is a malware-as-a-service (MaaS) operation targeting macOS systems exclusively. AMOS added a backdoor module earlier this year, allowing operators to execute commands, log keystrokes, and drop additional payloads. AMOS is dropped as a hidden file and scans for cryptocurrency wallets, browser data, macOS Keychain data, and files on the filesystem. Persistence is achieved via a LaunchDaemon running a hidden AppleScript that restarts the malware if terminated. Users are advised to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do. Kaspersky noted that asking ChatGPT if the provided instructions are safe reveals they are not.
Show sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
Information Snippets
-
The GPUGate malware campaign targets IT and software development companies in Western Europe.
First reported: 08.09.2025 18:023 sources, 4 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign uses Google Ads and fake GitHub commits to deliver malware.
First reported: 08.09.2025 18:023 sources, 6 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The attack began in December 2024 and uses a 128 MB Microsoft Software Installer (MSI) to evade detection.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware employs GPU-gated decryption to avoid analysis and detection.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware includes a Visual Basic Script that launches a PowerShell script with administrator privileges.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The PowerShell script adds Microsoft Defender exclusions, sets up scheduled tasks for persistence, and runs executable files from a downloaded ZIP archive.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The end goal is information theft and delivery of secondary payloads.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The threat actors have native Russian language proficiency and use a cross-platform approach, including Atomic macOS Stealer (AMOS).
First reported: 08.09.2025 18:022 sources, 4 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign targets macOS users through fake GitHub repositories.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The fake repositories impersonate popular tools like 1Password, Basecamp, Dropbox, and others.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The attacks use SEO poisoning to push malicious links to the top of search results.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The GitHub pages are created by multiple usernames to evade takedowns.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware is deployed via ClickFix-style instructions executed in the Terminal app.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Similar campaigns have used malicious sponsored Google Ads for Homebrew to distribute malware.
First reported: 20.09.2025 10:073 sources, 4 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Threat actors have been using public GitHub repositories to host and distribute malicious payloads.
First reported: 20.09.2025 10:073 sources, 4 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The Atomic (AMOS) malware is a malware-as-a-service operation available for $1,000/month.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The AMOS malware now includes a backdoor component for persistent, stealthy access to compromised systems.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign impersonates over 100 software solutions, including 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion, Gemini, Audacity, Adobe After Effects, Thunderbird, and SentinelOne.
First reported: 22.09.2025 18:361 source, 3 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The fake repositories use a 'download button' that directs visitors to a secondary site for installation commands.
First reported: 22.09.2025 18:361 source, 3 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The installation command performs a curl request to a base64-encoded URL to download the AMOS payload.
First reported: 22.09.2025 18:361 source, 3 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign continues to evade takedowns by creating new repositories from multiple accounts.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Users are advised to be cautious of running commands they do not understand and to trust official vendor websites for software downloads.
First reported: 22.09.2025 18:361 source, 3 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign has targeted a range of companies across the technology and financial sectors, including LastPass.
First reported: 22.09.2025 22:442 sources, 2 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown.
First reported: 22.09.2025 22:442 sources, 2 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign uses SEO poisoning to ensure the fake repositories are positioned well in search results.
First reported: 22.09.2025 22:442 sources, 2 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025.
First reported: 22.09.2025 22:442 sources, 3 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The threat actors may view Mac users as a low-hanging fruit due to the perception that Macs face fewer malware threats.
First reported: 22.09.2025 22:442 sources, 3 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The Atomic infostealer has been active since at least April 2023.
First reported: 22.09.2025 22:442 sources, 3 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign employs 'ClickFix' techniques to trick targets into executing commands in Terminal.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign uses Google Ads to drive traffic to malicious sites and promote them in Google Search results.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malicious sites feature convincing download portals for fake apps and instruct users to copy a curl command in their Terminal to install them.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The commands fetch and decode an 'install.sh' file, which downloads a payload binary, removing quarantine flags and bypassing Gatekeeper prompts.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The payload is either AMOS or Odyssey, executed on the machine after checking if the environment is a virtual machine or an analysis system.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware invokes sudo to run commands as root and collects detailed hardware and memory information of the host.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware manipulates system services like killing OneDrive updater daemons and interacts with macOS XPC services to blend its malicious activity with legitimate processes.
First reported: 18.10.2025 18:021 source, 1 articleShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
-
The malware harvests sensitive information stored on the browser, cryptocurrency credentials, and exfiltrates to the command and control (C2).
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Odyssey Stealer is a relatively new family derived from the Poseidon Stealer, which itself was forked from AMOS.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Odyssey Stealer targets credentials and cookies stored in Chrome, Firefox, and Safari browsers, over a hundred cryptocurrency wallet extensions, Keychain data, and personal files.
First reported: 18.10.2025 18:021 source, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
A new AMOS infostealer campaign abuses Google search ads to lure users into Grok and ChatGPT conversations that lead to installing the AMOS malware on macOS.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign was first spotted by researchers at Kaspersky, with a more detailed report by Huntress.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The ClickFix attack begins with victims searching for macOS-related terms, leading to malicious instructions in AI chats.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malicious instructions are hosted on legitimate LLM platforms and contain commands to install the malware.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The base64-encoded URL decodes into a bash script that loads a fake password prompt dialog.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The script validates, stores, and uses the provided password to execute privileged commands, including downloading and executing the AMOS infostealer.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
AMOS was first documented in April 2023 and is a malware-as-a-service (MaaS) operation targeting macOS systems exclusively.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
AMOS added a backdoor module earlier this year, allowing operators to execute commands, log keystrokes, and drop additional payloads.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
AMOS is dropped as a hidden file and scans for cryptocurrency wallets, browser data, macOS Keychain data, and files on the filesystem.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Persistence is achieved via a LaunchDaemon running a hidden AppleScript that restarts the malware if terminated.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Users are advised to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
Kaspersky noted that asking ChatGPT if the provided instructions are safe reveals they are not.
First reported: 11.12.2025 01:501 source, 1 articleShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
Similar Happenings
Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud
A new Android malware named Albiriox, operating under a malware-as-a-service (MaaS) model, targets over 400 applications for on-device fraud (ODF), screen manipulation, and real-time device interaction. The malware uses dropper applications distributed through social engineering lures and packing techniques to evade detection. It leverages a custom builder and a third-party crypting service to bypass antivirus and mobile security solutions. The primary goal is to seize control of mobile devices and conduct fraudulent actions while remaining undetected. The malware has been advertised on cybercrime forums, with evidence suggesting Russian-speaking threat actors. Initial campaigns have targeted Austrian victims using German-language lures and fake Google Play Store app listings. The malware's subscription access launched at $650 per month before rising to $720 after October 21.
AI-Powered Malware Families Deployed in the Wild
Google's Threat Intelligence Group (GTIG) has identified new malware families that leverage artificial intelligence (AI) and large language models (LLMs) for dynamic self-modification during execution. These malware families, including PromptFlux, PromptSteal, FruitShell, QuietVault, and PromptLock, demonstrate advanced capabilities for evading detection and maintaining persistence. PromptFlux, an experimental VBScript dropper, uses Google's LLM Gemini to generate obfuscated VBScript variants and evade antivirus software. It attempts persistence via Startup folder entries and spreads laterally on removable drives and mapped network shares. The malware is under development or testing phase and is assessed to be financially motivated. PromptSteal is a data miner written in Python that queries the LLM Qwen2.5-Coder-32B-Instruct to generate one-line Windows commands to collect information and documents in specific folders and send the data to a command-and-control (C2) server. It is used by the Russian state-sponsored actor APT28 in attacks targeting Ukraine. The use of AI in malware enables adversaries to create more versatile and adaptive threats, posing significant challenges for cybersecurity defenses. Various threat actors, including those from China, Iran, and North Korea, have been observed abusing AI models like Gemini across different stages of the attack lifecycle. The underground market for AI-powered cybercrime tools is also growing, with offerings ranging from deepfake generation to malware development and vulnerability exploitation.
Indirect Prompt Injection Vulnerabilities in ChatGPT Models
Researchers from Tenable discovered seven vulnerabilities in OpenAI's ChatGPT models (GPT-4o and GPT-5) that enable attackers to extract personal information from users' memories and chat histories. These vulnerabilities allow for indirect prompt injection attacks, which manipulate the AI's behavior to execute unintended or malicious actions. OpenAI has addressed some of these issues, but several vulnerabilities persist. The vulnerabilities include indirect prompt injection via trusted sites, zero-click indirect prompt injection in search contexts, and prompt injection via crafted links. Other techniques involve bypassing safety mechanisms, injecting malicious content into conversations, hiding malicious prompts, and poisoning user memories. The vulnerabilities affect the 'bio' feature, which allows ChatGPT to remember user details and preferences across chat sessions, and the 'open_url' command-line function, which leverages SearchGPT to access and render website content. Attackers can exploit the 'url_safe' endpoint by using Bing click-tracking URLs to lure users to phishing sites or exfiltrate user data. These findings highlight the risks associated with exposing AI chatbots to external tools and systems, which expand the attack surface for threat actors. The vulnerabilities stem from how ChatGPT ingests and processes instructions from external sources, allowing attackers to exploit these flaws through various methods. The most concerning issue is a zero-click vulnerability, where simply asking ChatGPT a benign question can trigger an attack if the search results include a poisoned website.
MuddyWater Expands Campaign with MuddyViper Backdoor Targeting Israeli Entities
The MuddyWater threat actor, linked to Iran and also known as Static Kitten, Mercury, and Seedworm, has conducted a global phishing campaign targeting over 100 organizations, including government entities, embassies, diplomatic missions, foreign affairs ministries, consulates, international organizations, and telecommunications firms in the Middle East and North Africa (MENA) region. The campaign used compromised email accounts to send phishing emails with malicious Microsoft Word documents containing macros that dropped and launched the Phoenix backdoor, version 4. This backdoor provided remote control over infected systems. The campaign was active starting August 19, 2025, and used a command-and-control (C2) server registered under the domain screenai[.]online. The attackers employed three remote monitoring and management (RMM) tools and a custom browser credential stealer, Chromium_Stealer. The malware and tools were hosted on a temporary Python-based HTTP service linked to NameCheap's servers. The campaign highlights the ongoing use of trusted communication channels by state-backed threat actors to evade defenses and infiltrate high-value targets. The server and server-side command-and-control (C2) component were taken down on August 24, 2025, likely indicating a new stage of the attack. The MuddyWater threat actor has also targeted Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors. The hacking group has delivered a previously undocumented backdoor called MuddyViper. The attacks also singled out one technology company based in Egypt. The attack chains involve spear-phishing and the exploitation of known vulnerabilities in VPN infrastructure to infiltrate networks and deploy legitimate remote management tools. The campaign uses a loader named Fooder that decrypts and executes the C/C++-based MuddyViper backdoor. The MuddyViper backdoor enables the attackers to collect system information, execute files and shell commands, transfer files, and exfiltrate Windows login credentials and browser data. Additionally, the MuddyWater threat actor has deployed a new backdoor called UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. The attack chain involves using spear-phishing tactics to distribute booby-trapped Microsoft Word documents that trigger the execution of a malicious payload once macros are enabled. The phishing messages impersonate the Turkish Republic of Northern Cyprus Ministry of Foreign Affairs and purport to invite recipients to an online seminar titled "Presidential Elections and Results." The VBA script in the dropper file is equipped to conceal any sign of malicious activity by displaying a Hebrew-language decoy image from Israeli telecommunications provider Bezeq about supposed disconnection periods in the first week of November 2025 across various cities in the country. UDPGangster establishes persistence through Windows Registry modifications and boasts of various anti-analysis checks to resist efforts made by security researchers to take it apart. UDPGangster connects to an external server ("157.20.182[.]75") over UDP port 1269 to exfiltrate collected data, run commands using "cmd.exe," transmit files, update C2 server, and drop and execute additional payloads.
GlassWorm malware targets OpenVSX, VS Code registries
The GlassWorm malware campaign has resurfaced with a third wave, adding 24 new packages to OpenVSX and Microsoft Visual Studio Marketplace. The malware uses invisible Unicode characters to hide malicious code and targets GitHub, NPM, and OpenVSX account credentials, as well as cryptocurrency wallet data. The campaign initially impacted 49 extensions, with an estimated 35,800 downloads, though this figure includes inflated numbers due to bots and visibility-boosting tactics. The Eclipse Foundation has revoked leaked tokens and introduced security measures, but the threat actors have pivoted to GitHub and now returned to OpenVSX with updated command-and-control endpoints. The malware's global reach includes systems in the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security has accessed the attackers' server and shared victim data with law enforcement. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The third wave of Glassworm uses Rust-based implants packaged inside the extensions and targets popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space.