A ClickFix marketing campaign concentrating on macOS customers delivers an AppleScript-based infostealer that collects credentials and stay session cookies from 14 browsers, 16 cryptocurrency wallets, and greater than 200 extensions.
Netskope Risk Labs researcher Jan Michael Alcantara advised The Register the crew initially observed the campaign final month, and has seen related cases as lately as final week.
ClickFix is a brilliant fashionable social engineering tactic used to trick folks into executing malicious instructions on their very own computer systems, often by clicking a faux pc downside repair or CAPTCHA immediate.
Whereas the researchers do not know who the cookie thief is, they notice the malware can infect each Home windows and macOS machines – Netskope beforehand warned in regards to the Windows-focused attacks – by utilizing a client-side JavaScript to filter victims by user-agent, ignoring cellular gadgets and directing desktop customers to both a Home windows or macOS-specific payload.
Victims, we’re advised, are in Asia and work within the finance sector.
Upon detecting a desktop surroundings, the malware directs customers to a faux CAPTCHA web page, performs one other inspection to find out the particular desktop OS, after which checks for macOS-specific strings inside the user-agent which can be used to load the AppleScript-based stealer.
The faux CAPTCHA prompts the person to open Highlight on their Mac, after which paste a “verification code” into the search characteristic. The phony code is a curl command, and as quickly because the sufferer hits Enter and executes it on their pc, the command silently downloads a malicious script from the attacker-controlled server. The script collects the sufferer’s username, hardcodes the command-and-control (C2) server deal with, and creates a short lived listing at /tmp/xdivcmp/ to stage all the stolen knowledge earlier than sending it to the C2.
Apple didn’t reply to The Register‘s inquiries for this story, nevertheless it’s vital to notice that the newest variations of macOS Tahoe (26.4) or macOS Sequoia embody a brand new characteristic designed to dam ClickFix attacks. It alerts customers after they try to stick doubtlessly malicious instructions into the Terminal software, so replace your working system to assist detect and stop some of these ClickFix attacks.
But when a person is operating an older OS model, or for some motive ignores the macOS warning and clicks the “paste anyway” choice, the malware strikes on to the credential-harvesting stage by deploying a really sneaky social engineering dialog field that masses the genuine macOS system lock icon from native assets. Customers see the lock, suppose it is a legit Apple dialog field, after which enter their system password.
The malware additionally takes excessive measures to power credential entry. It solely has a single motion button – there is no choice for customers to shut the dialog field window – and it retains reappearing till the sufferer enters a sound password.
That is what the malware steals
Person passwords are validated in actual time, utilizing macOS’s listing companies authentication, and if incorrect, the dialog field reappears, with this loop persevering with till the individual gives an accurate password.
Subsequent, it snarfs up all types of person knowledge, together with the macOS Keychain (which shops saved passwords, Wi-Fi credentials, safe notes, and cryptographic keys), whereas the malicious dialog loop captures the sufferer’s password in plaintext.
The stealer additionally targets 12 Chromium-based browsers: Chrome, Courageous, Edge, Vivaldi, Opera, Opera GX, Chrome Beta, Chrome Canary, Chromium, Chrome Dev, Arc, and CocCoc. For every of those, it searches person profiles and steals session tokens, authentication cookies, saved passwords and different autofill data together with bank card numbers, knowledge from greater than 200 browser extensions, and extension databases.
This browser-extension theft is very insidious because the miscreants’ malware is configured to swipe particulars from cryptocurrency wallets together with MetaMask, Phantom, Coinbase Pockets, Belief Pockets, and dozens of blockchain-specific ones. It additionally collects password supervisor credentials from LastPass, 1Password, Dashlane, Bitwarden, two-factor authentication apps together with Authy and Google Authenticator extensions, and numerous VPN and single sign-on extensions used for company entry.
Along with the Chromium browser knowledge, the malware steals cookie databases, form-autofill knowledge, grasp passwords, and saved credentials from Firefox and Waterfox, one other Firefox-based browser.
And past browser extensions, the stealer targets 16 standalone desktop cryptocurrency pockets functions: Exodus, Atomic, Electrum, Coinomi, Guarda, Ledger Stay, Trezor Suite, Bitcoin Core, Litecoin Core, Sprint Core, Dogecoin Core, Monero, Wasabi, Sparrow, Electron Money, and Electrum-LTC.
Alcantara advised us that this infostealer marketing campaign is unrelated to 1 that additionally focused macOS customers’ credentials and cryptocurrency wallets that Microsoft final week attributed to North Korean criminals regardless of related methods – corresponding to utilizing social engineering even when malware is operating.
Netskope has revealed a full checklist of indicators of compromise and scripts associated to this malware in its GitHub repository, so give {that a} learn. And because the risk hunters notice, “this marketing campaign serves as a reminder that social engineering stays a major risk to each Home windows and macOS customers.” ®













