<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Finance</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-finance.xml" rel="self" type="application/rss+xml"/><description>Items affecting financial services, banks, insurance, fintech.</description><language>en</language><lastBuildDate>Sun, 10 May 2026 19:33:31 +0000</lastBuildDate><item><title>ClickFix campaign expands to macOS — Macsync, Shub Stealer and AMOS delivered via Base64 Terminal commands that bypass Gatekeeper</title><link>https://ctipilot.ch/briefs/2026-05-10/clickfix-campaign-expands-to-macos-macsync-shub-stealer-and-amos-delivered-via-b/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/clickfix-campaign-expands-to-macos-macsync-shub-stealer-and-amos-delivered-via-b/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>phishing</category><category>infostealer</category><category>global</category><description><![CDATA[<p>Microsoft Threat Intelligence on 2026-05-06 documented an active ClickFix social-engineering campaign now targeting macOS users via fake utility-installation guides hosted on Medium, Squarespace, and Craft-built blogs (<a href="https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/" target="_blank" rel="noopener noreferrer">Microsoft Security Blog, 2026-05-06</a> · <a href="https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets" target="_blank" rel="noopener noreferrer">Malwarebytes — Shub Stealer earlier wave, 2026-03</a>). The lure pages instruct the visitor to copy a Base64-encoded command into Terminal; the decoded one-liner pipes a remote shell payload directly to <code>bash</code>, bypassing Gatekeeper because no signed application bundle is ever launched. Three distinct infostealers — <strong>Macsync</strong>, <strong>Shub Stealer</strong>, and <strong>AMOS (Atomic macOS Stealer)</strong> — are delivered across campaign variants per Microsoft, harvesting macOS Keychain entries, browser-profile credentials, iCloud data, and cryptocurrency wallet keys (Trezor, Ledger, Exodus, Electrum, Atomic, Coinomi, MetaMask, Phantom). Some variants substitute backdoored DMG copies of legitimate wallet applications (Ledger Live, Trezor Suite). Persistence uses LaunchAgent / LaunchDaemon plists with Telegram-fallback C2.</p>]]></description><content:encoded><![CDATA[<p>Microsoft Threat Intelligence on 2026-05-06 documented an active ClickFix social-engineering campaign now targeting macOS users via fake utility-installation guides hosted on Medium, Squarespace, and Craft-built blogs (<a href="https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/" target="_blank" rel="noopener noreferrer">Microsoft Security Blog, 2026-05-06</a> · <a href="https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets" target="_blank" rel="noopener noreferrer">Malwarebytes — Shub Stealer earlier wave, 2026-03</a>). The lure pages instruct the visitor to copy a Base64-encoded command into Terminal; the decoded one-liner pipes a remote shell payload directly to <code>bash</code>, bypassing Gatekeeper because no signed application bundle is ever launched. Three distinct infostealers — <strong>Macsync</strong>, <strong>Shub Stealer</strong>, and <strong>AMOS (Atomic macOS Stealer)</strong> — are delivered across campaign variants per Microsoft, harvesting macOS Keychain entries, browser-profile credentials, iCloud data, and cryptocurrency wallet keys (Trezor, Ledger, Exodus, Electrum, Atomic, Coinomi, MetaMask, Phantom). Some variants substitute backdoored DMG copies of legitimate wallet applications (Ledger Live, Trezor Suite). Persistence uses LaunchAgent / LaunchDaemon plists with Telegram-fallback C2.</p>
<p>ATT&amp;CK mapping: <a href="https://attack.mitre.org/techniques/T1204/002/" target="_blank" rel="noopener noreferrer">T1204.002 User Execution: Malicious File</a>, <a href="https://attack.mitre.org/techniques/T1059/004/" target="_blank" rel="noopener noreferrer">T1059.004 Unix Shell</a>, <a href="https://attack.mitre.org/techniques/T1555/001/" target="_blank" rel="noopener noreferrer">T1555.001 Credentials from Password Stores: Keychain</a>. <strong>Detection concepts:</strong> alert on Terminal spawning <code>curl</code> / <code>wget</code> immediately followed by pipe-to-shell execution from a non-developer profile; LaunchAgent file-creation events from outside <code>/Applications</code> or <code>/Library/Application Support/&lt;vendor&gt;</code> paths; anomalous Keychain API calls from processes without UI entitlements (Endpoint Security framework <code>ES_EVENT_TYPE_NOTIFY_OPENSSH</code>-style hooks expose this on EDR-instrumented Macs).</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/" target="_blank" rel="noopener noreferrer">Microsoft Security Blog, 2026-05-06</a> · <a class="src-additional" href="https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets" target="_blank" rel="noopener noreferrer">Malwarebytes — Shub Stealer earlier wave, 2026-03</a></span></aside>]]></content:encoded></item><item><title>German court finds bank liable for sophisticated phishing loss — PSD2/IP-analytics obligations clarified</title><link>https://ctipilot.ch/briefs/2026-05-09/german-court-finds-bank-liable-for-sophisticated-phishing-loss-psd2-ip-analytics/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/german-court-finds-bank-liable-for-sophisticated-phishing-loss-psd2-ip-analytics/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>phishing</category><category>identity</category><category>law-enforcement</category><category>europe</category><category>dach</category><description><![CDATA[<p>On 2026-04-22 the Landgericht Berlin II (Civil Chamber 38, case 38 O 293/25; not yet final pending appeal) ordered Deutsche Apotheker- und Ärztebank (Apobank) to reimburse €218,000+ in losses from a sophisticated phishing attack that combined forged physical bank letters, manipulated online banking interfaces, and spoofed-number phone calls (<a href="https://www.heise.de/news/Urteil-gegen-die-Apobank-Finanzinstitut-haftet-fuer-Phishing-Schaden-11288231.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a> · <a href="https://www.anwalt.de/rechtstipps/phishing-ilex-rechtsanwaelte-erwirkt-haftung-der-apobank-269786.html" target="_blank" rel="noopener noreferrer">ilex Rechtsanwälte — case summary, 2026-05</a>). The court rejected gross-negligence defences, finding the fraud was too sophisticated to attribute to customer failure. Critically, the ruling found the bank&#39;s fraud-detection systems failed to act on a clear anomaly visible in bank-side logs: the new device registration and first login originated from materially different IP addresses and ISPs. The court treated this as an obligation under Germany&#39;s PSD2 implementation — specifically, a duty to apply IP-based behavioural analytics and trigger a strong-customer-authentication challenge when registration and first-use IPs diverge. For EU/Swiss financial-sector and public-sector digital-service providers: this reinforces the trend of courts placing authentication-failure liability on service providers when fraud signals are present in server-side telemetry but not acted on.</p>]]></description><content:encoded><![CDATA[<p>On 2026-04-22 the Landgericht Berlin II (Civil Chamber 38, case 38 O 293/25; not yet final pending appeal) ordered Deutsche Apotheker- und Ärztebank (Apobank) to reimburse €218,000+ in losses from a sophisticated phishing attack that combined forged physical bank letters, manipulated online banking interfaces, and spoofed-number phone calls (<a href="https://www.heise.de/news/Urteil-gegen-die-Apobank-Finanzinstitut-haftet-fuer-Phishing-Schaden-11288231.html" target="_blank" rel="noopener noreferrer">heise online, 2026-05-08</a> · <a href="https://www.anwalt.de/rechtstipps/phishing-ilex-rechtsanwaelte-erwirkt-haftung-der-apobank-269786.html" target="_blank" rel="noopener noreferrer">ilex Rechtsanwälte — case summary, 2026-05</a>). The court rejected gross-negligence defences, finding the fraud was too sophisticated to attribute to customer failure. Critically, the ruling found the bank&#39;s fraud-detection systems failed to act on a clear anomaly visible in bank-side logs: the new device registration and first login originated from materially different IP addresses and ISPs. The court treated this as an obligation under Germany&#39;s PSD2 implementation — specifically, a duty to apply IP-based behavioural analytics and trigger a strong-customer-authentication challenge when registration and first-use IPs diverge. For EU/Swiss financial-sector and public-sector digital-service providers: this reinforces the trend of courts placing authentication-failure liability on service providers when fraud signals are present in server-side telemetry but not acted on.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.heise.de/news/Urteil-gegen-die-Apobank-Finanzinstitut-haftet-fuer-Phishing-Schaden-11288231.html" target="_blank" rel="noopener noreferrer">heise online — Urteil gegen die Apobank, 2026-05-08</a> · <a class="src-additional" href="https://www.anwalt.de/rechtstipps/phishing-ilex-rechtsanwaelte-erwirkt-haftung-der-apobank-269786.html" target="_blank" rel="noopener noreferrer">ilex Rechtsanwälte case summary</a></span></aside>]]></content:encoded></item><item><title>Swiss and DACH Deployment Context</title><link>https://ctipilot.ch/briefs/2026-05-09/swiss-and-dach-deployment-context/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/swiss-and-dach-deployment-context/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>pre-auth</category><category>rce</category><category>auth-bypass</category><category>patch-available</category><category>zero-click</category><category>switzerland</category><category>dach</category><description><![CDATA[<p>SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery&#39;s ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.</p>]]></description><content:encoded><![CDATA[<p>SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery&#39;s ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.</p>
<p>For DACH-region organisations: BSI IT-Grundschutz includes email encryption gateways in the APP.4.4 component scope; a known RCE cluster in such a gateway qualifies for an extraordinary IT-Grundschutz gap notification under ISMS procedures.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://security-hub.ncsc.admin.ch/api/posts/12551/details" target="_blank" rel="noopener noreferrer">NCSC-CH Security Hub post 12551, 2026-05-08</a> · <a class="src-additional" href="https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#security" target="_blank" rel="noopener noreferrer">SEPPmail release notes v15.0</a></span></aside>]]></content:encoded></item></channel></rss>