New macOS stealer campaign uses Script Editor in ClickFix attack

BleepingComputer
Actively Exploited

Overview

A new campaign is targeting macOS users with the Atomic Stealer malware, using the Script Editor to execute commands in a method similar to a previous ClickFix attack. This tactic tricks users into running malicious scripts, which can lead to sensitive data being stolen. The attack primarily affects macOS computers, putting users’ personal information at risk. Security researchers are urging users to be cautious about running scripts from untrusted sources, as this method can bypass some security measures. Awareness and vigilance are key, as these types of attacks can lead to significant data breaches if not addressed promptly.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: macOS users, Atomic Stealer malware
  • Action Required: Users should avoid executing scripts from untrusted sources and ensure their macOS is updated with the latest security patches.
  • Timeline: Newly disclosed

Original Article Summary

A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix attack that tricked users into executing commands in Terminal. [...]

Impact

macOS users, Atomic Stealer malware

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Users should avoid executing scripts from untrusted sources and ensure their macOS is updated with the latest security patches.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to macOS, Apple, Malware.

Related Coverage

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

The Hacker News

Google has updated its Quick Share service to enable compatibility with Apple's AirDrop, facilitating easier file sharing between Android and iPhone devices. This feature is currently available for the Pixel 10 lineup and is expected to expand to other devices in the future.

Nov 21, 2025

New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

Infosecurity Magazine

The article discusses a new macOS malware chain attributed to FlexibleFerret, which employs staged scripts and a Go-based backdoor to steal user credentials and maintain persistent access to infected systems. This represents a significant cybersecurity threat to macOS users, emphasizing the need for heightened security measures against such sophisticated attacks.

Nov 25, 2025

DPRK's FlexibleFerret Tightens macOS Grip

darkreading

The DPRK's FlexibleFerret campaign is evolving its tactics to enhance its social engineering scams aimed at macOS users, indicating a sophisticated approach to credential theft. This ongoing threat underscores the need for heightened awareness and security measures among macOS users to protect against such attacks.

Nov 25, 2025

​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​

All CISA Advisories

CISA has identified that various cyber threat actors are using commercial spyware to target users of mobile messaging applications, employing tactics such as phishing, zero-click exploits, and impersonation. The focus is primarily on high-value individuals including government and military officials, indicating a serious threat to sensitive communications.

Nov 24, 2025

IT threat evolution in Q3 2025. Non-mobile statistics

Securelist

The report highlights the evolving landscape of IT threats in Q3 2025, focusing on malware targeting Windows and macOS personal computers, as well as IoT devices. This indicates a growing severity of cyber threats that could have significant implications for users and organizations relying on these systems.

Nov 19, 2025

India Rolls Back App Mandate Amid Surveillance Concerns

darkreading

India has decided to roll back its mandate requiring citizens to install a cybersecurity app designed to enhance surveillance and security. The app, intended to monitor digital activities, faced backlash over privacy concerns, with citizens worried about excessive government monitoring and data collection. The government's initial push for this app was met with skepticism, drawing comparisons to Apple's controversial decision to distribute a U2 album to all iTunes users. By reversing this mandate, India acknowledges the public's apprehension regarding personal privacy and the implications of government surveillance. This situation underscores the delicate balance between national security and individual privacy rights, a conversation that continues to evolve in the digital age.

Dec 5, 2025