TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

GBHackers

Fake Disk Cleanup Apps Fuel New macOS ClickFix Attack

Mayura Kathir · 2 hours ago · Read original ↗

ATT&CK techniques detected

6 predictions
T1059.002AppleScript
93%
"instead streams an obfuscated shell script directly from the network into the shell, which sets persistence via a launchagent plist ( for example, ~ / library / launchagent / com. < random name >. plist ) that embeds a heavily obfuscated applescript stager. that applescript cycle…"
T1204.004Malicious Copy and Paste
71%
"fake disk cleanup apps fuel new macos clickfix attack a wave of clickfix - style social engineering attacks that specifically target macos users, using fake disk cleanup and system utility tips hosted on popular content platforms. instead of installing helpful tools, these termin…"
T1553.001Gatekeeper Bypass
54%
"or installer on disk. this tradecraft allows the attack to bypass macos gatekeeper checks that typically apply to downloaded apps opened via finder, because the malicious code arrives and executes purely through user ‑ initiated terminal commands. fake disk cleanup apps microsoft…"
T1204.002Malicious File
46%
"fake disk cleanup apps fuel new macos clickfix attack a wave of clickfix - style social engineering attacks that specifically target macos users, using fake disk cleanup and system utility tips hosted on popular content platforms. instead of installing helpful tools, these termin…"
T1543.001Launch Agent
43%
"instead streams an obfuscated shell script directly from the network into the shell, which sets persistence via a launchagent plist ( for example, ~ / library / launchagent / com. < random name >. plist ) that embeds a heavily obfuscated applescript stager. that applescript cycle…"
T1543.004Launch Daemon
39%
"endpoint, while deploying a hidden. mainhelper backdoor and. agent wrapper plus a launchdaemon ( com. finder. helper. plist ) to ensure the malware is relaunched with root privileges at every boot. macos clickfix attack across the loader and helper branches, the infostealers sear…"

Summary

A wave of ClickFix-style social engineering attacks that specifically target macOS users, using fake disk cleanup and system utility tips hosted on popular content platforms. Instead of installing helpful tools, these Terminal commands silently fetch and execute infostealers such as Macsync, Shub Stealer, and AMOS that steal passwords, iCloud data, documents, and cryptocurrency wallets. In […]

The post Fake Disk Cleanup Apps Fuel New macOS ClickFix Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.