<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(microsoft.com) Evolution of ClickFix: How Threat Actors Exploit macOS Terminal Commands to Distribute Infostealers]]></title><description><![CDATA[<p>(microsoft.com) Evolution of ClickFix: How Threat Actors Exploit macOS Terminal Commands to Distribute Infostealers</p><p>In brief - Threat actors are exploiting macOS Terminal commands via social engineering to distribute infostealers (MacSync, SHub Stealer, AMOS). These attacks bypass Gatekeeper, harvest sensitive data (Keychain, crypto wallets, browser creds), and replace legitimate wallet apps with trojanized versions. High-risk campaign leveraging native utilities for stealth and persistence.</p><p>Technically - The ClickFix campaign uses multi-stage execution paths (loader, script, helper) to deploy malware via obfuscated Terminal commands. Techniques include:<br />- Gatekeeper bypass via `curl`/`osascript` for in-memory execution<br />- Persistence via LaunchAgents/Daemons<br />- Data exfil via HTTP POST/Telegram C2<br />- Anti-VM checks in Mach-O payloads<br />- Dynamic C2 discovery (Telegram fallback)<br />- Cryptocurrency wallet trojanization<br />Monitor Terminal activity, outbound downloads, and script execution to detect.</p><p>Source: <a href="https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/" rel="nofollow noopener"><span>https://www.</span><span>microsoft.com/en-us/security/b</span><span>log/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/6a19a3b6-825c-4b2f-865e-2803d71c486e/microsoft.com-evolution-of-clickfix-how-threat-actors-exploit-macos-terminal-commands-to-distribute-infostealers</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:54:20 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/6a19a3b6-825c-4b2f-865e-2803d71c486e.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 17:14:00 GMT</pubDate><ttl>60</ttl></channel></rss>