Google ads for shared ChatGPT, Grok guides push macOS infostealer malware
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是一个新的AMOS信息窃取恶意软件的活动。攻击者利用Google搜索广告,引导用户进入Grok和ChatGPT的对话中。这些对话看似提供有用的指导,但实际上会安装恶意软件到macOS系统上。 接下来,我需要提取关键信息:攻击方式、目标平台、恶意软件功能以及防范建议。然后,把这些信息浓缩成简洁的句子,确保不超过100字。 可能的结构是:攻击者如何操作、目标是什么、恶意软件的作用以及用户需要注意的地方。这样既全面又简洁。 最后,检查语言是否流畅,确保没有遗漏重要信息。 </think> 新的AMOS信息窃取恶意软件通过Google搜索广告诱骗用户进入Grok和ChatGPT对话,看似提供帮助实则安装恶意软件。攻击针对macOS用户,利用虚假指令引导执行终端命令以获取权限并传播恶意软件。该恶意软件专门针对macOS系统,可窃取加密钱包、浏览器数据及Keychain信息,并通过LaunchDaemon实现持久化。用户需谨慎执行未知来源的命令以避免感染。 2025-12-11 00:0:25 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Google ads for shared ChatGPT, Grok guides push macOS infostealer malware

A new AMOS infostealer campaign is abusing Google search ads to lure users into Grok and ChatGPT conversations that appear to offer “helpful” instructions but ultimately lead to installing the AMOS info-stealing malware on macOS.

The campaign was first spotted by researchers at cybersecurity company Kaspersky yesterday, while Huntress managed security platform published a more detailed report earlier today.

The ClickFix attack begins with victims searching for macOS-related terms, such as maintenance questions, problem-solving, or for Atlas - OpenAI's AI-powered web browser for macOS.

Google advertisement link directly to ChatGPT and Grok conversations that had been publicly shared in preparation for the attack. The chats are hosted on the legitimate LLM platforms and contain the malicious instructions used to install the malware.

Malicious ChatGPT (left) and Grok (right) conversations
Malicious ChatGPT (left) and Grok (right) conversations
Source: Huntress

"During our investigation, the Huntress team reproduced these poisoned results across multiple variations of the same question, 'how to clear data on iMac,' 'clear system data on iMac,' 'free up storage on Mac,' confirming this isn't an isolated result but a deliberate, widespread poisoning campaign targeting common troubleshooting queries," Huntress researchers explain.

If users fall for the trick and execute the commands from the AI chat in macOS Terminal, a base64-encoded URL decodes into a bash script (update) that loads a fake password prompt dialog.

The bash script
The bash script
Source: Huntress

When the password is provided, the script validates, stores, and uses it to execute privileged commands, such as downloading the AMOS infostealer and executing the malware with root-level privileges.

AMOS was first documented in April 2023. It is a malware-as-a-service (MaaS) operation that rents the infostealer $1,000/month, targeting macOS systems exclusively.

Earlier this year, AMOS added a backdoor module that lets operators execute commands on infected hosts, log key strokes, and drop additional payloads.

AMOS is dropped on /Users/$USER/ as a hidden file (.helper). When launched, it scans the applications folder for Ledger Wallet and Trezor Suite. If found, it overwrites them with trojanized versions that prompt the victim to enter their seed phrase "for security" reasons.

Looking for crypto wallet apps to overwrite
Replacing crypto wallet apps with trojanized versions
Source: Huntress

AMOS also targets cryptocurrency wallets from Electrum, Exodus, MetaMask, Ledger Live, Coinbase Wallet, and others; browser data such as cookies, saved passwords, autofill data, and session tokens; macOS Keychain data such as app passwords and Wi-Fi credentials; and files on the filesystem.

Persistence is achieved via a LaunchDaemon (com.finder.helper.plist) running a hidden AppleScript which acts as a watchdog loop, restarting the malware within one second if terminated.

These latest ClickFix attacks are yet another example of threat actors experimenting with new ways to exploit legitimate, popular platforms like OpenAI and X.

Users need to be vigilant and avoid executing commands they found online, especially if they don't fully understand what they do.

Kaspersky noted that, even after reaching these manipulated LLM conversations, a simple follow-up question asking ChatGPT if the provided instructions are safe to execute reveals that they aren't.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/google-ads-for-shared-chatgpt-grok-guides-push-macos-infostealer-malware/
如有侵权请联系:admin#unsafe.sh