ctipilot.chSwitzerland · Europe · Public sector

ClickFix expands to macOS — Macsync / Shub Stealer / AMOS via Base64 Terminal-paste lures bypass Gatekeeper (Microsoft research)

campaign · campaign:clickfix-macos-2026

Coverage timeline
1
first 2026-05-10 → last 2026-05-10
Briefs
1
1 distinct
Sources cited
2
2 hosts
Sections touched
1
research
Co-occurring entities
0
no co-occurrence

Story timeline

  1. 2026-05-10CTI Daily Brief — 2026-05-10
    researchFirst coverage. Microsoft documents ClickFix social engineering targeting macOS via fake utility-installation guides on Medium/Squarespace/Craft blogs. Base64 Terminal-paste → bash pipeline bypasses Gatekeeper. Three infostealers (Macsync, Shub Stealer, AMOS). Targets Keychain, browser creds, iCloud, crypto wallets (Trezor/Ledger/Exodus/Electrum/Atomic/Coinomi/MetaMask/Phantom). Some variants substitute backdoored DMG copies of legitimate wallet apps.

Where this entity is cited

  • research1

Source distribution

  • malwarebytes.com1 (50%)
  • microsoft.com1 (50%)

Items in briefs about ClickFix expands to macOS — Macsync / Shub Stealer / AMOS via Base64 Terminal-paste lures bypass Gatekeeper (Microsoft research) (2)

ClickFix campaign expands to macOS — Macsync, Shub Stealer and AMOS delivered via Base64 Terminal commands that bypass Gatekeeper

From CTI Daily Brief — 2026-05-10 · published 2026-05-10 · view item permalink →

Microsoft Threat Intelligence on 2026-05-06 documented an active ClickFix social-engineering campaign now targeting macOS users via fake utility-installation guides hosted on Medium, Squarespace, and Craft-built blogs (Microsoft Security Blog, 2026-05-06 · Malwarebytes — Shub Stealer earlier wave, 2026-03). The lure pages instruct the visitor to copy a Base64-encoded command into Terminal; the decoded one-liner pipes a remote shell payload directly to bash, bypassing Gatekeeper because no signed application bundle is ever launched. Three distinct infostealers — Macsync, Shub Stealer, and AMOS (Atomic macOS Stealer) — are delivered across campaign variants per Microsoft, harvesting macOS Keychain entries, browser-profile credentials, iCloud data, and cryptocurrency wallet keys (Trezor, Ledger, Exodus, Electrum, Atomic, Coinomi, MetaMask, Phantom). Some variants substitute backdoored DMG copies of legitimate wallet applications (Ledger Live, Trezor Suite). Persistence uses LaunchAgent / LaunchDaemon plists with Telegram-fallback C2.

ATT&CK mapping: T1204.002 User Execution: Malicious File, T1059.004 Unix Shell, T1555.001 Credentials from Password Stores: Keychain. Detection concepts: alert on Terminal spawning curl / wget immediately followed by pipe-to-shell execution from a non-developer profile; LaunchAgent file-creation events from outside /Applications or /Library/Application Support/<vendor> paths; anomalous Keychain API calls from processes without UI entitlements (Endpoint Security framework ES_EVENT_TYPE_NOTIFY_OPENSSH-style hooks expose this on EDR-instrumented Macs).

Detect ClickFix-style Terminal-paste social engineering on macOS endpoints

From CTI Daily Brief — 2026-05-10 · published 2026-05-10 · view item permalink →

Add detection for Terminal spawning curl / wget immediately followed by pipe-to-shell execution from a non-developer profile, anomalous LaunchAgent / LaunchDaemon plist creation outside /Applications and /Library/Application Support/<vendor> paths, and Keychain-API access by processes without UI entitlements (Microsoft Security Blog, 2026-05-06). Brief end-users that Base64 Terminal-paste prompts on utility-installation pages are a malware delivery technique.