Fake Mac fixes trick users into installing new Shamos infostealer



A new infostealer malware targeting Mac devices, called ‘Shamos,’ is targeting Mac devices in ClickFix attacks that impersonate troubleshooting guides and fixes.

The new malware, which is a variant of the Atomic macOS Stealer (AMOS), was developed by the cybercriminal group “COOKIE SPIDER,” and is used to steal data and credentials stored in web browsers, Keychain items, Apple Notes, and cryptocurrency wallets.

CrowdStrike, which detected Shamos, reports that the malware has attempted infections against over three hundred environments worldwide that they monitor since June 2025.

Promoted through ClickFix attacks

Victims are lured via malvertising or fake GitHub repositories that utilize ClickFix attacks that prompt users into executing shell commands in the macOS Terminal.

The threat actors prompt users to run these commands to install software or fix fake errors, but when executed, they actually download and execute the malware on the device.

Malicious GitHub repository
Malicious GitHub repository
Source: CrowdStrike

The ads or spoofed pages (mac-safer[.]com, rescue-mac[.]com) claim to provide help with macOS problems people are likely to search for, containing instructions directing them to copy and paste the command to fix the issue.

Malicious sponsored results on Google Search
Malicious sponsored results on Google Search
Source: CrowdStrike

Instead of fixing anything, the command decodes a Base64-encoded URL and fetches a malicious Bash script from a remote server.

False instructions on fixing printer issues on macOS
False instructions for fixing printer issues on macOS
Source: CrowdStrike

The script captures the user’s password, downloads the Shamos mach-O executable, and prepares and executes the malware using ‘xattr’ (removes quarantine flag) and ‘chmod’ (makes binary executable) to bypass Gatekeeper.

Shamos data theft

Once executed on the device, Shamos executes anti-VM commands to verify it’s not running on a sandbox, followed by AppleScript commands for host reconnaissance and data collection.

Shamos searches for sensitive data on the device, including cryptocurrency wallet files, keychain data, Apple Notes data, and information stored on the victim’s browser.

After collecting everything, it packages them into an archive named ‘out.zip’ and transmits them to the attacker using curl.

In the cases where the malware runs with sudo privileges, it also creates a Plist file (com.finder.helper.plist) and stores it in the user’s LaunchDaemons directory, ensuring persistence via automatic execution on system startup.

CrowdStrike also notes that Shamos can download additional payloads into the victim’s home directory, and has observed cases where threat actors dropped a spoofed Ledger Live wallet app and a botnet module.

MacOS users are advised never to execute commands on their system that they found online if they don’t fully understand what they do.

The same applies to GitHub repositories, as the platform is unfortunately a host to numerous malicious projects aimed at infecting unsuspecting users.

When facing issues with macOS, it is better that you avoid sponsored search results and instead seek help in the Apple Community forums, which are moderated by Apple, or the system’s built-in Help (Cmd + Space → “Help”).

ClickFix attacks have become a widespread tactic in distributing malware, with threat actors using them in TikTok videos, disguising them as captchas, or as fixes for fake Google Meet errors

This tactic has proven to be so effective in deploying malware that it has been used in ransomware attacks and even by state-sponsored threat actors.

46% of environments had passwords cracked, nearly doubling from 25% last year.

Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.


Source link


Leave a Reply

Your email address will not be published. Required fields are marked *