<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Terminal — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/terminal/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 15:20:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/terminal/feed.xml" rel="self" type="application/rss+xml"/><item><title>ClickFix Campaign Targets macOS Users with Infostealers via Fake Utility Fixes</title><link>https://feed.craftedsignal.io/briefs/2026-05-clickfix/</link><pubDate>Wed, 06 May 2026 15:20:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-clickfix/</guid><description>The ClickFix campaign targets macOS users with fake utility fixes, tricking them into running malicious Terminal commands to install infostealing malware such as Macsync, Shub Stealer, and AMOS.</description><content:encoded><![CDATA[<p>The ClickFix campaign is an ongoing threat targeting macOS users by employing social engineering techniques to deliver infostealing malware. Since at least February 2026, threat actors have been observed hosting malicious commands on various platforms, including blog sites and content creation platforms, disguised as macOS utility fixes (e.g., disk space optimization). These commands, when executed by unsuspecting users, lead to the installation of infostealers such as Macsync, Shub Stealer, and AMOS. These malware variants collect and exfiltrate sensitive data, including media files, iCloud data, Keychain entries, and cryptocurrency wallets. Some campaigns also replace legitimate cryptocurrency wallet applications with trojanized versions, further compromising user security. This campaign represents a shift from previous tactics involving disk image files to a more direct approach leveraging Terminal commands and native macOS utilities to bypass traditional security checks like Gatekeeper.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker hosts malicious commands on websites, blog posts, or content platforms disguised as macOS utility fixes.</li>
<li>The user is tricked into copying and pasting a malicious command into the macOS Terminal.</li>
<li>The Terminal command executes a script, often Base64-encoded, which retrieves a remotely hosted payload using <code>curl</code>.</li>
<li>The downloaded payload, a shell script, is executed.  This script performs reconnaissance by collecting system information (keyboard layout, hostname, OS version, IP address).</li>
<li>The script checks for Russian/CIS keyboard layouts as a kill switch; if detected, execution halts.</li>
<li>If the kill switch is not activated, the script downloads and executes an AppleScript payload directly in memory using <code>osascript</code>.</li>
<li>The AppleScript payload steals credentials, cryptocurrency wallet data, and other sensitive information.</li>
<li>The stolen data is exfiltrated to attacker-controlled servers via HTTP POST requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The ClickFix campaign poses a significant threat to macOS users, potentially leading to the theft of sensitive personal and financial information. Victims who execute the malicious commands risk losing credentials, iCloud data, cryptocurrency holdings, and other valuable data. The campaign&rsquo;s use of trojanized cryptocurrency wallet apps adds an additional layer of risk, potentially leading to further financial losses. While the total number of victims is unknown, the widespread nature of the campaign and the use of popular platforms like Medium suggest a potentially large impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious macOS Terminal Command Chains&rdquo; to identify command-line execution patterns indicative of the ClickFix campaign.</li>
<li>Block the C2 domains and IP addresses listed in the IOC table at the network perimeter to prevent communication with attacker infrastructure.</li>
<li>Monitor process creation events for <code>osascript</code> executing downloaded scripts, as detailed in the &ldquo;AppleScript infostealer&rdquo; section.</li>
<li>Educate users about the risks of copying and pasting commands from untrusted sources into the Terminal.</li>
<li>Implement application control policies to prevent the execution of unauthorized applications and scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>macos</category><category>infostealer</category><category>clickfix</category><category>terminal</category></item></channel></rss>