A cyber campaign is targeting macOS users through a fake website impersonating the popular utility CleanMyMac that distributes the infostealer SHub with ClickFix tactic. Instead of downloading a normal installer, the page presents an “advanced installation” step convincing users to manually run a shell command. Once executed, it steals sensitive data including browser credentials, Apple Keychain entries, cryptocurrency wallet data, messaging sessions. The attack highlights sophisticated macOS infostealers that rely on social engineering rather than exploiting software vulnerabilities. Attack begins as users visit spoofed domain resembling official CleanMyMac site. Victims are instructed to open the macOS Terminal, paste a command appearing legitimate, which first prints a reassuring reference to real CleanMyMac website, then decodes a hidden Base64 link, downloads a malicious shell script from an attacker-controlled server. This script pipes directly into the shell interpreter, allowing immediate execution without security warnings. As user runs command voluntarily, macOS protections Gatekeeper, notarization checks, XProtect cannot effectively block the activity. After execution, a loader script performs system checks including keyboard-language detection to avoid machines with Russian keyboards. After passing checks, system details like hostname, macOS version, IP address, locale sent to command-and-control server. It then launches an AppleScript payload closing the Terminal window, displays fake system password prompt. As user enters password, SHub accesses the Keychain and collects browser credentials, cryptocurrency wallet data, developer tokens, shell histories, and messaging sessions before compressing and exfiltrating them to remote server. The malware also establishes persistence by creating a LaunchAgent disguised as Google’s updater, may modify cryptocurrency wallet applications to steal credentials. Users should avoid running Terminal commands provided by websites, download software only from official vendor sources or the App Store, monitor systems for suspicious persistence files. If compromise is suspected, remove malicious agents, change passwords, revoke tokens, migrate cryptocurrency wallets to secure environments immediately.
Two high-severity security vulnerabilities have been identified in Composer, posing a risk of arbitrary command execution if exploited. These flaws affect the Perforce VCS (version...
Rockstar Games has confirmed a data breach after the ShinyHunters extortion group leaked stolen data on its leak site. The attackers claim the data was obtained using compromised a...
Microsoft has released its April 2026 Patch Tuesday security updates, addressing 167 vulnerabilities, including two zero-day flaws. Among the 167 vulnerabilities, 8 are classified ...