Evil ClickFix Targets macOS Users with Infostealers

Cybersecurity experts are raising alarms about ClickFix, a new tool targeting macOS systems, linked to North Korean hackers. This malicious software is designed to steal sensitive information from users, making it a significant threat.

Malware & RansomwareHIGHUpdated: Published: πŸ“° 14 sources

Original Reporting

SOSophos News

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Think of ClickFix like a sneaky thief that tricks you into opening your door. Once inside, it quietly takes your personal information without you even knowing. This is especially dangerous for people who use their Macs for important stuff like online banking or storing sensitive documents.

What Happened

Cybersecurity experts are raising alarms about ClickFix, a new tool targeting macOS systems. This malicious software is designed to steal sensitive information from users, making it a significant threat. As more people rely on their Macs for personal and professional tasks, the risk of data theft has never been higher.

ClickFix operates by infiltrating macOS devices and extracting data such as passwords, credit card information, and personal files. The stealthy nature of this tool means that users may not even realize their information is being compromised until it's too late. As the digital landscape evolves, so do the tactics of cybercriminals, making it crucial for users to stay informed and vigilant.

Recent analysis from Jamf Threat Labs indicates that this new ClickFix campaign marks a significant evolution in attack methods. The campaign uses a fake Apple-themed webpage that presents itself as a disk space cleanup tool. When users click an execute button, it silently triggers the Script Editor, making the process feel routine and safe. This new variant has removed the need for users to copy and paste commands into the Terminal, streamlining the infection chain and reducing user hesitation.

Moreover, a new variant called notnullOSX has been identified, specifically targeting crypto holders with wallets exceeding $10,000. This malware employs two parallel attack paths: ClickFix social engineering and malicious DMG disk image files. The operators of notnullOSX meticulously select their victims, gathering information such as social media profiles and wallet addresses before launching an attack. This targeted approach makes it particularly dangerous for high-value targets.

Recent reports have linked these attacks to North Korean hackers, who have been using various social engineering techniques to target macOS users within financial organizations. Campaigns uncovered by Any.Run show that these attackers exploit compromised accounts of known contacts to send fake meeting invitations, directing victims to websites mimicking legitimate platforms like Zoom or Microsoft Teams. Victims are then prompted to execute commands in Terminal to resolve fake connection issues, leading to the execution of malware designed to collect sensitive data.

New findings indicate that the ClickFix campaign is evolving to potentially target mobile devices, particularly iOS, which could significantly increase the number of affected users. This shift suggests that attackers are adapting their strategies to exploit vulnerabilities across multiple platforms, raising the stakes for all Apple device users.

How It Works

ClickFix tricks users into executing malicious commands on their own systems. Instead of dropping malware through a link or attachment, attackers manipulate victims into clicking buttons that run scripts prepared to download malware, usually an infostealer. The new method replaces the old tactic of asking users to paste commands into Terminal with a one-click solution that claims to clean their Macs.

The notnullOSX variant begins with a fake protected Google document that urges the victim to take actions leading to malware installation. One path uses ClickFix, instructing the victim to click a button that opens Script Editor with a pre-filled command that downloads the Atomic Stealer payload directly into memory. The second path involves a malicious DMG disk image that appears routine, leading to the same malware installation without triggering security warnings. The modular architecture of notnullOSX allows it to download separate binaries for various theft tasks, including stealing data from iMessage, Apple Notes, and crypto wallets.

The ClickFix campaign's execution begins with a pre-filled script in Script Editor that is disguised as an Apple storage optimization utility. The embedded command is obfuscated to evade detection, and it downloads the Atomic Stealer payload directly into memory, avoiding disk writes and making it harder to detect. This new method of invoking Script Editor directly from a browser click significantly reduces the friction for potential victims, making it easier for attackers to execute their malicious code.

Recent findings from Netskope Threat Labs highlight that the ClickFix campaign is not limited to macOS; it can also infect Windows machines by using client-side JavaScript to filter victims based on their user-agent. This adaptability broadens the attack's reach, targeting users in the finance sector, particularly in Asia. The malware is capable of stealing credentials and live session cookies from 14 browsers, 16 cryptocurrency wallets, and over 200 extensions, making it a formidable threat.

Who's Being Targeted

ClickFix primarily targets macOS users, particularly those who may be experiencing technical issues and are looking for solutions online. The social engineering aspect of ClickFix exploits the conditioning of users to follow prompts that seem routine or helpful, making it difficult for even seasoned security professionals to identify the threat. The new campaign specifically targets users through deceptive cleanup instructions that appear legitimate, leveraging the familiarity of the Script Editor to execute malicious commands. In contrast, notnullOSX specifically targets crypto holders, focusing on those with significant assets. The operators of notnullOSX utilize an affiliate panel to hand-pick victims, ensuring that only those with wallets over $10,000 are targeted, which raises the stakes significantly for users in the cryptocurrency space. Recent reports indicate that the ClickFix campaign has seen a notable increase in activity, with a surge in phishing attempts and fake websites designed to lure unsuspecting users. Additionally, the involvement of North Korean hackers has added a new layer of sophistication to these attacks, as they employ various tactics to deceive victims.

Signs of Infection

Victims may not notice anything unusual until sensitive information is compromised. However, signs can include unexpected prompts to execute commands or unusual behavior in applications following a visit to a suspicious site. Users should be particularly wary of prompts from the Script Editor, as these can indicate a high-risk situation. Additionally, users targeted by notnullOSX may receive fake documents or prompts that seem routine but lead to malware installation.

Why Should You Care

Imagine your home being broken into while you’re asleep, and the thief quietly takes your valuables. That’s what ClickFix does to your digital life. If you use a Mac, your personal information, financial data, and even work-related documents are at risk. Protecting your data is not just a tech issue; it’s a personal safety concern.
Every time you enter your password or credit card details, you trust your device to keep that information safe. With threats like ClickFix and notnullOSX lurking, that trust can be shattered. You wouldn’t leave your front door unlocked, so why leave your digital door wide open?

What’s Being Done

Cybersecurity teams are actively monitoring the situation and developing strategies to combat ClickFix. Software companies, including Apple, are working on patches to fortify macOS against this threat. For instance, macOS Tahoe 26.4 has introduced a warning feature when attempting to execute commands, providing an additional layer of security against ClickFix attacks. However, the Atomic Stealer campaign has already shifted its tactics to exploit the Script Editor, circumventing these warnings.

In response to the emergence of notnullOSX, security researchers recommend that users never paste Terminal commands from a browser or document, treat any app requesting Full Disk Access during installation as suspicious, and regularly check for unfamiliar entries in ~/Library/LaunchAgents. If you’re a macOS user, here’s what you should do right now:

  • Update your operating system to the latest version to benefit from security patches.
  • Use reliable antivirus software to detect and remove threats.
  • Be cautious with downloads and avoid clicking on suspicious links.
  • Educate yourself and your team about the evolving tactics of cybercriminals to recognize potential threats. Experts are watching for how ClickFix evolves and whether new variants will emerge, so staying informed is crucial for your safety.

πŸ”’ Pro Insight

The emergence of ClickFix and its variants highlights the evolving threat landscape for macOS users, particularly as attackers adapt their strategies to exploit vulnerabilities across multiple platforms, including mobile devices.

πŸ“… Story Timeline

Story broke by Sophos News

Covered by Sophos News

Covered by SecurityWeek

Covered by The Hacker News

Covered by Malwarebytes Labs

Covered by Recorded Future Blog

Covered by Cyber Security News

Covered by CSO Online

Covered by BleepingComputer

Covered by Huntress Blog

Covered by Infosecurity Magazine

Covered by Help Net Security

Covered by Dark Reading

Covered by The Register Security

Related Pings