GPUGate Malware Campaign Targets IT Firms in Western Europe
Summary
Hide ▲
Show ▼
A sophisticated malware campaign, codenamed GPUGate, targets IT and software development companies in Western Europe, with recent expansions to macOS users. The campaign leverages Google Ads, SEO poisoning, and fake GitHub commits to deliver malware, including the Atomic macOS Stealer (AMOS) and Odyssey. The attack began in December 2024 and uses a 128 MB Microsoft Software Installer (MSI) to evade detection. The malware employs GPU-gated decryption and various techniques to avoid analysis and detection. The end goal is information theft and delivery of secondary payloads. The threat actors have native Russian language proficiency and use a cross-platform approach. The campaign has expanded to target macOS users through fake Homebrew, LogMeIn, and TradingView platforms. These platforms impersonate popular tools and use SEO poisoning to distribute the Atomic Stealer malware and Odyssey. The threat actors use multiple GitHub usernames to evade takedowns and deploy malware via Terminal commands. Similar tactics have been observed in previous campaigns using malicious Google Ads and public GitHub repositories. The AMOS malware now includes a backdoor component for persistent, stealthy access to compromised systems. The campaign impersonates over 100 software solutions, including 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion, Gemini, Audacity, Adobe After Effects, Thunderbird, and SentinelOne. The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025. A new AMOS infostealer campaign abuses Google search ads to lure users into Grok and ChatGPT conversations that lead to installing the AMOS malware on macOS. The campaign was first spotted by researchers at Kaspersky, with a more detailed report by Huntress. The ClickFix attack begins with victims searching for macOS-related terms, leading to malicious instructions in AI chats. The malicious instructions are hosted on legitimate LLM platforms and contain commands to install the malware. The base64-encoded URL decodes into a bash script that loads a fake password prompt dialog. The script validates, stores, and uses the provided password to execute privileged commands, including downloading and executing the AMOS infostealer. AMOS was first documented in April 2023 and is a malware-as-a-service (MaaS) operation targeting macOS systems exclusively. AMOS added a backdoor module earlier this year, allowing operators to execute commands, log keystrokes, and drop additional payloads. AMOS is dropped as a hidden file and scans for cryptocurrency wallets, browser data, macOS Keychain data, and files on the filesystem. Persistence is achieved via a LaunchDaemon running a hidden AppleScript that restarts the malware if terminated. Users are advised to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do. Kaspersky noted that asking ChatGPT if the provided instructions are safe reveals they are not. Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant's Defender Security Research Team observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer. The campaigns use techniques like fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft, including web browser credentials and session data, iCloud Keychain, and developer secrets. The starting point of these attacks is often a malicious ad, often served through Google Ads, that redirects users searching for tools like DynamicLake and artificial intelligence (AI) tools to fake sites that employ ClickFix lures, tricking them into infecting their own machines with malware.
Timeline
-
04.02.2026 09:42 1 articles · 15h ago
Microsoft warns of expanding macOS infostealer campaigns
Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant's Defender Security Research Team observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer. The campaigns use techniques like fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft, including web browser credentials and session data, iCloud Keychain, and developer secrets. The starting point of these attacks is often a malicious ad, often served through Google Ads, that redirects users searching for tools like DynamicLake and artificial intelligence (AI) tools to fake sites that employ ClickFix lures, tricking them into infecting their own machines with malware.
Show sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
18.10.2025 18:02 2 articles · 3mo ago
New malware payloads AMOS and Odyssey target macOS developers
The campaign targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms. The campaign employs 'ClickFix' techniques to trick targets into executing commands in Terminal. The campaign uses Google Ads to drive traffic to malicious sites and promote them in Google Search results. The malicious sites feature convincing download portals for fake apps and instruct users to copy a curl command in their Terminal to install them. The commands fetch and decode an 'install.sh' file, which downloads a payload binary, removing quarantine flags and bypassing Gatekeeper prompts. The payload is either AMOS or Odyssey, executed on the machine after checking if the environment is a virtual machine or an analysis system. The malware invokes sudo to run commands as root and collects detailed hardware and memory information of the host. The malware manipulates system services like killing OneDrive updater daemons and interacts with macOS XPC services to blend its malicious activity with legitimate processes. The malware harvests sensitive information stored on the browser, cryptocurrency credentials, and exfiltrates to the command and control (C2).
Show sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
22.09.2025 22:44 2 articles · 4mo ago
Threat actors view Mac users as low-hanging fruit
The threat actors may view Mac users as a low-hanging fruit due to the perception that Macs face fewer malware threats. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025.
Show sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
22.09.2025 18:36 2 articles · 4mo ago
AMOS malware adds backdoor for persistent access
The Atomic (AMOS) malware now includes a backdoor component, giving attackers persistent, stealthy access to compromised systems. The AMOS malware is a malware-as-a-service operation available for $1,000/month.
Show sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
20.09.2025 10:07 4 articles · 4mo ago
GPUGate campaign expands to macOS users through fake GitHub repositories
The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign uses SEO poisoning to ensure the fake repositories are positioned well in search results. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025. The campaign now targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms.
Show sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
08.09.2025 18:02 7 articles · 4mo ago
GPUGate Malware Campaign Targets IT Firms in Western Europe
The campaign has targeted a range of companies across the technology and financial sectors, including LastPass. The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign uses SEO poisoning to ensure the fake repositories are positioned well in search results. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025. The campaign now targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms. A new AMOS infostealer campaign abuses Google search ads to lure users into Grok and ChatGPT conversations that lead to installing the AMOS malware on macOS. The campaign was first spotted by researchers at Kaspersky, with a more detailed report by Huntress. The ClickFix attack begins with victims searching for macOS-related terms, leading to malicious instructions in AI chats. The malicious instructions are hosted on legitimate LLM platforms and contain commands to install the malware. The base64-encoded URL decodes into a bash script that loads a fake password prompt dialog. The script validates, stores, and uses the provided password to execute privileged commands, including downloading and executing the AMOS infostealer. AMOS was first documented in April 2023 and is a malware-as-a-service (MaaS) operation targeting macOS systems exclusively. AMOS added a backdoor module earlier this year, allowing operators to execute commands, log keystrokes, and drop additional payloads. AMOS is dropped as a hidden file and scans for cryptocurrency wallets, browser data, macOS Keychain data, and files on the filesystem. Persistence is achieved via a LaunchDaemon running a hidden AppleScript that restarts the malware if terminated. Users are advised to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do. Kaspersky noted that asking ChatGPT if the provided instructions are safe reveals they are not. Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant's Defender Security Research Team observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer. The campaigns use techniques like fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft, including web browser credentials and session data, iCloud Keychain, and developer secrets. The starting point of these attacks is often a malicious ad, often served through Google Ads, that redirects users searching for tools like DynamicLake and artificial intelligence (AI) tools to fake sites that employ ClickFix lures, tricking them into infecting their own machines with malware.
Show sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
Information Snippets
-
The GPUGate malware campaign targets IT and software development companies in Western Europe.
First reported: 08.09.2025 18:023 sources, 4 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The campaign uses Google Ads and fake GitHub commits to deliver malware.
First reported: 08.09.2025 18:023 sources, 6 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The attack began in December 2024 and uses a 128 MB Microsoft Software Installer (MSI) to evade detection.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware employs GPU-gated decryption to avoid analysis and detection.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The malware includes a Visual Basic Script that launches a PowerShell script with administrator privileges.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The PowerShell script adds Microsoft Defender exclusions, sets up scheduled tasks for persistence, and runs executable files from a downloaded ZIP archive.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The end goal is information theft and delivery of secondary payloads.
First reported: 08.09.2025 18:022 sources, 2 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
-
The threat actors have native Russian language proficiency and use a cross-platform approach, including Atomic macOS Stealer (AMOS).
First reported: 08.09.2025 18:022 sources, 5 articlesShow sources
- GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms — thehackernews.com — 08.09.2025 18:02
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign targets macOS users through fake GitHub repositories.
First reported: 20.09.2025 10:073 sources, 6 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The fake repositories impersonate popular tools like 1Password, Basecamp, Dropbox, and others.
First reported: 20.09.2025 10:073 sources, 6 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The attacks use SEO poisoning to push malicious links to the top of search results.
First reported: 20.09.2025 10:073 sources, 6 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The GitHub pages are created by multiple usernames to evade takedowns.
First reported: 20.09.2025 10:073 sources, 6 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The malware is deployed via ClickFix-style instructions executed in the Terminal app.
First reported: 20.09.2025 10:073 sources, 6 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Similar campaigns have used malicious sponsored Google Ads for Homebrew to distribute malware.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Threat actors have been using public GitHub repositories to host and distribute malicious payloads.
First reported: 20.09.2025 10:073 sources, 5 articlesShow sources
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — thehackernews.com — 20.09.2025 10:07
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The Atomic (AMOS) malware is a malware-as-a-service operation available for $1,000/month.
First reported: 22.09.2025 18:363 sources, 5 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The AMOS malware now includes a backdoor component for persistent, stealthy access to compromised systems.
First reported: 22.09.2025 18:363 sources, 5 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign impersonates over 100 software solutions, including 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion, Gemini, Audacity, Adobe After Effects, Thunderbird, and SentinelOne.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The fake repositories use a 'download button' that directs visitors to a secondary site for installation commands.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The installation command performs a curl request to a base64-encoded URL to download the AMOS payload.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign continues to evade takedowns by creating new repositories from multiple accounts.
First reported: 22.09.2025 18:363 sources, 5 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Users are advised to be cautious of running commands they do not understand and to trust official vendor websites for software downloads.
First reported: 22.09.2025 18:362 sources, 4 articlesShow sources
- LastPass: Fake password managers infect Mac users with malware — www.bleepingcomputer.com — 22.09.2025 18:36
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign has targeted a range of companies across the technology and financial sectors, including LastPass.
First reported: 22.09.2025 22:443 sources, 3 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown.
First reported: 22.09.2025 22:443 sources, 3 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign uses SEO poisoning to ensure the fake repositories are positioned well in search results.
First reported: 22.09.2025 22:443 sources, 3 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025.
First reported: 22.09.2025 22:443 sources, 4 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The threat actors may view Mac users as a low-hanging fruit due to the perception that Macs face fewer malware threats.
First reported: 22.09.2025 22:443 sources, 4 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The Atomic infostealer has been active since at least April 2023.
First reported: 22.09.2025 22:443 sources, 4 articlesShow sources
- Attackers Use Phony GitHub Pages to Deliver Mac Malware — www.darkreading.com — 22.09.2025 22:44
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign targets macOS developers with fake Homebrew, LogMeIn, and TradingView platforms.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign employs 'ClickFix' techniques to trick targets into executing commands in Terminal.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign uses Google Ads to drive traffic to malicious sites and promote them in Google Search results.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The malicious sites feature convincing download portals for fake apps and instruct users to copy a curl command in their Terminal to install them.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The commands fetch and decode an 'install.sh' file, which downloads a payload binary, removing quarantine flags and bypassing Gatekeeper prompts.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The payload is either AMOS or Odyssey, executed on the machine after checking if the environment is a virtual machine or an analysis system.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The malware invokes sudo to run commands as root and collects detailed hardware and memory information of the host.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The malware manipulates system services like killing OneDrive updater daemons and interacts with macOS XPC services to blend its malicious activity with legitimate processes.
First reported: 18.10.2025 18:022 sources, 2 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The malware harvests sensitive information stored on the browser, cryptocurrency credentials, and exfiltrates to the command and control (C2).
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Odyssey Stealer is a relatively new family derived from the Poseidon Stealer, which itself was forked from AMOS.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Odyssey Stealer targets credentials and cookies stored in Chrome, Firefox, and Safari browsers, over a hundred cryptocurrency wallet extensions, Keychain data, and personal files.
First reported: 18.10.2025 18:022 sources, 3 articlesShow sources
- Google ads for fake Homebrew, LogMeIn sites push infostealers — www.bleepingcomputer.com — 18.10.2025 18:02
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
A new AMOS infostealer campaign abuses Google search ads to lure users into Grok and ChatGPT conversations that lead to installing the AMOS malware on macOS.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaign was first spotted by researchers at Kaspersky, with a more detailed report by Huntress.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The ClickFix attack begins with victims searching for macOS-related terms, leading to malicious instructions in AI chats.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The malicious instructions are hosted on legitimate LLM platforms and contain commands to install the malware.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The base64-encoded URL decodes into a bash script that loads a fake password prompt dialog.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The script validates, stores, and uses the provided password to execute privileged commands, including downloading and executing the AMOS infostealer.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
AMOS was first documented in April 2023 and is a malware-as-a-service (MaaS) operation targeting macOS systems exclusively.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
AMOS added a backdoor module earlier this year, allowing operators to execute commands, log keystrokes, and drop additional payloads.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
AMOS is dropped as a hidden file and scans for cryptocurrency wallets, browser data, macOS Keychain data, and files on the filesystem.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Persistence is achieved via a LaunchDaemon running a hidden AppleScript that restarts the malware if terminated.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Users are advised to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Kaspersky noted that asking ChatGPT if the provided instructions are safe reveals they are not.
First reported: 11.12.2025 01:502 sources, 2 articlesShow sources
- Google ads for shared ChatGPT, Grok guides push macOS infostealer malware — www.bleepingcomputer.com — 11.12.2025 01:50
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The tech giant's Defender Security Research Team observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The campaigns use techniques like fileless execution, native macOS utilities, and AppleScript automation to facilitate data theft, including web browser credentials and session data, iCloud Keychain, and developer secrets.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
The starting point of these attacks is often a malicious ad, often served through Google Ads, that redirects users searching for tools like DynamicLake and artificial intelligence (AI) tools to fake sites that employ ClickFix lures, tricking them into infecting their own machines with malware.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Python-based stealers are being leveraged by attackers to rapidly adapt, reuse code, and target heterogeneous environments with minimal overhead. They are typically distributed via phishing emails and collect login credentials, session cookies, authentication tokens, credit card numbers, and crypto wallet data.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
One such stealer is PXA Stealer, which is linked to Vietnamese-speaking threat actors and is capable of harvesting login credentials, financial information, and browser data.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Microsoft identified two PXA Stealer campaigns in October 2025 and December 2025 that used phishing emails for initial access.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Attack chains involved the use of registry Run keys or scheduled tasks for persistence and Telegram for command-and-control communications and data exfiltration.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Bad actors have been observed weaponizing popular messaging apps like WhatsApp to distribute malware like Eternidade Stealer and gain access to financial and cryptocurrency accounts.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Other stealer-related attacks have revolved around fake PDF editors like Crystal PDF that are distributed via malvertising and search engine optimization (SEO) poisoning through Google Ads to deploy a Windows-based stealer that can stealthily collect cookies, session data, and credential caches from Mozilla Firefox and Chrome browsers.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
To counter the threat posed by infostealer threats, organizations are advised to educate users on social engineering attacks like malvertising redirect chains, fake installers, and ClickFix-style copy-paste prompts. It's also advised to monitor for suspicious Terminal activity and access to the iCloud Keychain, as well as inspect network egress for POST requests to newly registered or suspicious domains.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
-
Being compromised by infostealers can lead to data breaches, unauthorized access to internal systems, business email compromise (BEC), supply chain attacks, and ransomware attacks.
First reported: 04.02.2026 09:421 source, 1 articleShow sources
- Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers — thehackernews.com — 04.02.2026 09:42
Similar Happenings
Android Malware Campaign Abuses Hugging Face Platform
A new Android malware campaign leverages the Hugging Face platform to distribute thousands of variants of an APK payload designed to steal credentials from popular financial and payment services. The attack begins with a dropper app called TrustBastion, which uses scareware-style ads to lure victims into installing it. The malware then redirects to a Hugging Face repository to download the final payload, using server-side polymorphism to evade detection. The malware exploits Android’s Accessibility Services to capture screenshots, monitor user activity, and steal credentials. The campaign was discovered by Bitdefender researchers, who found over 6,000 commits in the repository. The repository was taken down but resurfaced under a new name, 'Premium Club,' with the same malicious code. Bitdefender has published indicators of compromise and informed Hugging Face, which removed the malicious datasets. The infection chain begins when users download the malicious Android app TrustBastion, which appears as scareware via popups claiming the device is infected with malware. The dropper app prompts users to run an update that mimics legitimate Google Play and Android system update dialog boxes. The dropper contacts an encrypted endpoint hosted at trustbastion[.]com, which returns an HTML file containing a redirect link to the Hugging Face repository hosting the malware. The malware masquerades as a 'Phone Security' feature to guide users through enabling Accessibility Services. The malware requests permissions for screen recording, screen casting, and overlay display to monitor all user activity and capture screen content. The malware captures lockscreen information for security verification of financial and payment services.
Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace
A malicious Microsoft Visual Studio Code (VS Code) extension named "ClawdBot Agent - AI Coding Assistant" was discovered on the official Extension Marketplace. The extension, which posed as a free AI coding assistant, stealthily dropped a malicious payload on compromised hosts. The extension was taken down by Microsoft after being reported by cybersecurity researchers. The malicious extension executed a binary named "Code.exe" that deployed a legitimate remote desktop program, granting attackers persistent remote access to compromised hosts. The extension also incorporated multiple fallback mechanisms to ensure payload delivery, including retrieving a DLL from Dropbox and using hard-coded URLs to obtain the payloads. Additionally, security researchers found hundreds of unauthenticated Moltbot instances online, exposing sensitive data and credentials. Moltbot, an open-source personal AI assistant, can run 24/7 locally, maintaining a persistent memory and executing scheduled tasks. However, insecure deployments can lead to sensitive data leaks, corporate data exposure, credential theft, and command execution. Hundreds of Clawdbot Control admin interfaces are exposed online due to reverse proxy misconfiguration, allowing unauthenticated access and root-level system access. More than 230 malicious packages for OpenClaw (formerly Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. These malicious skills impersonate legitimate utilities and inject information-stealing malware payloads onto users' systems, targeting sensitive data like API keys, wallet private keys, SSH credentials, and browser passwords. Users are advised to audit their configurations, revoke connected service integrations, and implement network controls to mitigate potential risks. A self-styled social networking platform built for AI agents, Moltbook, contained a misconfigured database that allowed full read and write access to all data. The exposure was due to a Supabase API key exposed in client-side JavaScript, granting unauthenticated access to the entire production database. Researchers accessed 1.5 million API authentication tokens, 30,000 email addresses, and thousands of private messages between agents. The API key exposure allowed attackers to impersonate any agent on the platform, post content, send messages, and interact as that agent. Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and deface the site.
GoBruteforcer Botnet Expands Attacks on Linux Servers
The GoBruteforcer botnet has expanded its attacks to target databases of cryptocurrency and blockchain projects, exploiting weak credentials and misconfigured software. Over 50,000 publicly accessible servers are vulnerable, with the botnet turning compromised machines into scanning and attack nodes. A more capable variant of the malware, written in Go, was observed in mid-2025, featuring heavier obfuscation and stronger persistence. The botnet exploits predictable usernames and weak defaults, targeting exposed services like XAMPP and WordPress admin panels. Financial motives are evident, with tools found to scan TRON balances and sweep tokens on TRON and Binance Smart Chain. On-chain analysis confirms some successful attacks, though most affected addresses held small balances. The botnet uses common operational usernames such as 'myuser' and 'appuser', and common passwords like '123321' and 'testing'. GoBruteforcer campaigns tweak the credential sets depending on the target, including cryptocurrency-themed usernames and passwords.
OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
GhostPoster Campaign Uses Steganography in Firefox Addon Logos
The GhostPoster campaign, which hides malicious JavaScript code in the PNG logos of Firefox extensions, has been discovered to have infected 17 additional extensions across Chrome, Firefox, and Edge stores, accumulating a total of 840,000 installations. The campaign, first reported by Koi Security researchers in December, involves extensions that monitor browser activity and plant a backdoor. The hidden script acts as a loader that fetches the main payload from a remote server, retrieving it only 10% of the time to evade detection. The payload can hijack affiliate links, inject tracking code, and commit click and ad fraud. The campaign originated on Microsoft Edge and expanded to Firefox and Chrome, with some extensions present in browser add-on stores since 2020. A more advanced variant of the payload was identified in the 'Instagram Downloader' extension, which uses a bundled image file as a covert payload container. The newly identified extensions have been removed from Mozilla's and Microsoft's add-on stores, but users who installed them may still be at risk. Google has confirmed the removal of all identified extensions from the Chrome Web Store.