NutNow you can listen to the Fox News items!
Clickfix, a social engineering tactic that has been aimed at both Windows and MAC users since the beginning of 2024, continues to evolve.
Last month I reported how attackers used CAPTCHA false directions Call Windows users to install the same malware.
Now this same trick is becoming Macos. Cybersecurity researchers have discovered a new campaign through Clickfix to deliver Atomic Macos Stealer (AMOS), a powerful malware who directs malicious software aimed at Apple Systems.
Fake Fake Spot online, avoid subscription scams on Facebook
Illustration of a computer pirate at work. (Kurt “Cyberguy” Knutsson)
What is malware clickfix and how does it work?
Safety researchers at Cloudsek They have identified a new threat aimed at Macos users through imitation and deception. The campaign uses a technique known as Clickfix to attract victims through false online verification indications. This time, the attackers are sports spectrum, a major telecommunications provider in the United States. They use fraudulent domains that look great in the spectrum support portals. These include misleading addresses such as the net Spectrum Panel and Spectrum Ticket clean.
Visitors to these places show a standard-looking CAPTCHA box, asking them to verify their identity. When they do, the site shows a fake error message that says CAPTCHA has failed. It is recommended that users click on a “alternative verification” button. This triggers an order to be copied in silence to their door -Reading. The following depends on the user’s operating system. In Macos, instructions guide the user to paste and execute the order in terminal. This order is actually a Shell script designed to steal information and download malicious software.
The script is especially dangerous because it uses legitimate orders of the Macos system. Ask for the system password, collects credentials and deactivates security protections. Then download owners. It is a known information carrier with a background of apple devices orientation. Malicious software collects sensitive data such as passwords, Cryptocurrency’s portfolio, automatic browser data and saved cookies.
Researchers believe that the campaign was created by Russian -speaking attackers. The tracks include Russian -written comments inside the Malware Code. Analysts also said that the delivery infrastructure was poorly mounted. The mismatch instructions appeared on devices. For example, Linux users showed Windows orders. Mac users were told to press the keys that exist only on Windows machines.
Sign up -you do to my free cyberguy report
Get my best technological tips, urgent security alerts and exclusive offers delivered directly to your inbox. In addition, you will get instantaneous access to my definitive scam survival guide, free when you unite.

Fake Captcha in a Mac. (Cloudsek)
The hackers who are out of stealing your identity
Why Clickfix attacks are so effective
Clickfix is a social engineering method that has rapidly gained popularity among cybercrime. It is based on users who trust what simple instructions see and blindly. In this campaign, the attacker’s goal is to cause the victim to execute the process of infection in herself. Once the user follows, the system is committed without needing a traditional exploitation.
Researchers believe that Clickfix has been active from at least March 2024. I first reported it in June 2024, when Attackers used fake error messages From Google Chrome, Microsoft Word and Onedrive to promote their useful loads. The victims were shown that they are offering a “solution”, which copied a Powershell malicious command to his door -al. They were then commissioned to paste and execute Powershell or through the execution dialog.
In November 2024, the method had evolved even more. A New Wave Google Meet Users’ attacksStarting with Phishing emails that the guests imitated at the internal meeting. These emails contained links that were redirected to false destination pages designed to seem to come from the victim’s own organization.

Fake Captcha in a Mac. (Cloudsek)
Malicious software exposes 3.9 billion passwords in a huge threat of cybersecurity
6 ways to protect -SE of Clickfix and similar malicious software
To protect the evolutionary threat of Malware Clickfix, which continues to address users through social engineering tactics, consider the implementation of these six essential security measures:
1. Be skeptical of CAPTCHA’s directions: CAPTCHA’s legitimate evidence never require you to paste anything in the terminal. If a website tells you that you do it, it is likely to be a scam. Close the page immediately and avoid interacting with it.
2. Do not click the non -verified email links and use a strong antivirus software: Many Clickfix attacks also start with Phishing emails that replace trusted services such as Booking.com or Google Meet. Always verify the sender before clicking the links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking on any link inside the email.
The best way to protect the malicious links that install malicious software, which can potentially access private information, is to install a strong antivirus software on all your devices. This protection can also alert you to Phishing emails and ransomware scams, maintaining safe personal information and digital assets. Get my options for the best antivirus 2025 protection winners for your Windows, Mac, Android and iOS devices.
3. Activate the authentication of two factors: Enable Authentication of two factors Whenever possible. This adds an additional security layer requiring a second form of verification, such as a code sent to the phone, as well as your password.
Get Fox Business during clicking here
4. Keep updated devices: Regularly Update your operating system, browser and safety software Ensures that you have the last patches against known vulnerabilities. Cyberdelinquents exploit obsolete systems, so allowing automatic updates is a simple but effective way to keep it protected.
5. Supervise your accounts for suspicious activities and change the passwords: If you have interacted with a suspicious website, a phishing email or a fake login page, see your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password reset or financial transactions you do not recognize. If something seems disabled, change your passwords immediately and report the activity to the relevant service provider. Also consider using a Password manager to generate and store complex passwords. Get more details about my The best password managers reviewed by 2025 experts here.
6. Invest in personal data withdrawal service: Consider using a service that supervises your personal information and alert you to possible breaches or unauthorized use of your data. These services can provide signs of early alert for identity theft or other malicious activities derived from Clickfix or similar attacks. While no service promises to delete all of your Internet data, having a delete service is excellent if you want to constantly control and automate the process of eliminating the information of hundreds of places continuously for a longer period of time. Check out my best options for data removal services here.
Get a Free Exploration To find out if your personal information is already on the network
A massive security defect puts at risk the most popular browsers at Mac
Kurt’s Key Takeaway
Even experienced users can be fooled when malicious routine behavior is disguised. The attack not only exploded a vulnerability in handsome, but also their familiarity with the verification flows. Whenever safety instructions may seem part of the usual experience, people will continue to run the malicious code. MAC users, like everyone else, have to deal with all family interface with a little more skepticism. Especially when you ask for your password.
Click here to get the Fox News app
Do you think technology companies are doing enough to stop malware like Clickfix? Do -us to know by writing -us to Cyberguy.com/contact.
For more information on my technology tips and security alerts, subscribe -Free Cyberguy Report Bulletin Cyberguy.com/newsletter
Ask Kurt or ask us what stories you would like to be able to reach.
Follow Kurt in their social channels
Answers to Cyberguy Questions Most Failed:
New of Kurt:
Copyright 2025 cyberguy.com. All rights reserved.
#Malicious #software #aims #MAC #users #CAPTCHA #MOTHER #FALSIFER
Image Source : www.foxnews.com