A recent malware campaign targeting macOS systems has made headlines, as it has adopted a sophisticated technique to infiltrate users’ devices. This evolution in tactics employs a ClickFix attack, now leveraging the Script Editor as the execution vector, rather than relying on the traditional Terminal-based methods.
This malicious initiative has been identified by researchers from Jamf Threat Labs, specializing in cybersecurity threats. The primary goal of this campaign is to deliver a particularly insidious piece of malware known as the Atomic Stealer (AMOS), which functions as both an infostealer and a backdoor targeting macOS operating systems specifically.
The onset of this campaign appears to be a strategic response to the latest update from Apple’s operating system. With its new security features, the update has begun warning users that they might unknowingly facilitate the installation of malware through ClickFix attacks. This form of attack utilizes social engineering techniques, wherein cybercriminals manipulate users through deceptive dialogue boxes containing phony instructions or verification messages. This entraps users into copying, pasting, and subsequently executing harmful code on their own devices.
Historically, ClickFix attacks aimed at macOS prompted users to input commands into the macOS Terminal, often masquerading as troubleshooting or maintenance procedures. However, this latest variant of the Atomic Stealer seeks to enhance its effectiveness by shifting the delivery method. Instead of directing users to the Terminal, attackers now utilize a browser-triggered workflow to open the Script Editor. In this manner, users are subtly encouraged to enter malicious commands, unknowingly facilitating their devices’ compromise.
### Countering Malware: Apple’s Incremental Steps
In a bid to combat ClickFix attacks, Apple introduced security enhancements in the recent macOS 26.4 update. This update includes a feature that scans commands pasted into the Terminal before execution, serving as a warning system for users to recognize potentially malicious commands. The shift of the Atomic Stealer campaign to exploit the Script Editor indicates that attackers are keenly aware of the latest security features and are adapting their methodologies to evade detection.
Thijs Xhaflaire, a senior threat and detections researcher at Jamf Threat Labs, remarked on this cat-and-mouse game in a blog post published on April 8. He pointed out that while Apple has made strides in enhancing users’ security, attackers will continually seek out new vulnerabilities to exploit. Xhaflaire stated, “It’s a meaningful friction point, but as this campaign illustrates, when one door closes, attackers find another.”
In the campaign documented by Jamf, prospective victims are presented with a full browser window, deceptively posing as an official Apple communication offering advice on reclaiming disk space on their Mac systems. While the exact methods used to lure victims to these pages are not disclosed, it is typical for ClickFix campaigns to rely on harmful links or malvertising to attract unsuspecting users.
The process, once initiated, directs users to follow step-by-step instructions under the guise of reclaiming disk space. Ultimately, this sequence leads users to open the Script Editor and inadvertently paste in malicious commands, which initiate the malware payload, thus compromising the system.
Xhaflaire emphasized the cunning nature of this approach, noting, “By shifting execution from Terminal to Script Editor, the attacker preserves a familiar delivery mechanism while quietly changing how and where the command actually runs. It’s a small adjustment with a meaningful impact.”
### The Growing Threat of ClickFix Attacks
ClickFix attacks have surfaced as one of the predominant methods for cybercriminals to disseminate malware and execute phishing schemes. This alarming trend necessitates immediate and proactive measures from network administrators and cybersecurity professionals. Recommended actions include restricting users’ abilities to execute run dialog commands and clipboard functions, limiting the execution of potentially harmful executables, and blocking access to known malicious advertisements and websites.
As the landscape of cybersecurity continually evolves, it is imperative for both individuals and organizations to remain vigilant. Keeping abreast of new threats and understanding the intricacies of malware campaigns like the one targeting macOS users will contribute significantly to mitigating risks and bolstering defenses against these sophisticated attacks. The recent developments with the Atomic Stealer serve as a crucial reminder of the ever-adaptive nature of cyber threats and the importance of constant vigilance in digital security.

