spot_img

Date:

Share:

Kaspersky uncovers macOS infostealer campaign abusing ChatGPT’s chat-sharing feature

Kaspersky Threat Research has identified a new malware campaign that uses paid Google search ads and shared conversations on the official ChatGPT website to trick Mac users into running a command that installs the AMOS (Atomic macOS Stealer) infostealer and a persistent backdoor on their devices.

In the campaign, attackers buy sponsored search ads for queries such as “chatgpt atlas” and direct users to a page that appears to be an installation guide for “ChatGPT Atlas for macOS” hosted at chatgpt.com. In reality, the page is a shared ChatGPT conversation generated through prompt engineering and then sanitised so that only the step-by-step “installation” instructions remain. The guide instructs users to copy a single line of code, open Terminal on macOS, paste the command, and grant all requested permissions.

Kaspersky researchers analysis shows that the command downloads and executes a script from the external domain atlas-extension[.]com. The script repeatedly prompts the user for their system password and validates the password by attempting to run system commands. Once the correct password is supplied, the script downloads the AMOS infostealer, uses the stolen credentials to install it, and launches the malware. The infection flow represents a variation of the so-called ClickFix technique, in which users are persuaded to manually execute shell commands that retrieve and run code from remote servers.

After installation, AMOS collects data that can be monetised or reused in later intrusions. The malware targets passwords, cookies, and other information from popular browsers, data from cryptocurrency wallets such as Electrum, Coinomi, and Exodus, and information from applications including Telegram Desktop and OpenVPN Connect. It also searches for files with TXT, PDF, and DOCX extensions in the Desktop, Documents, and Downloads folders, as well as files stored by the Notes application, then exfiltrates this data to attacker-controlled infrastructure. In parallel, the attack installs a backdoor that is configured to start automatically on reboot, gives remote access to the compromised system, and duplicates much of AMOS’s data-collection logic.

The campaign reflects a broader trend in which infostealers have become one of 2025’s fastest-growing threats, with attackers actively experimenting with AI-related themes, fake AI tools, and AI-generated content to increase the credibility of their lures. Recent waves have included fake AI browser sidebars and fraudulent clients for popular models; the Atlas-themed activity extends this pattern by abusing a legitimate AI platform’s built-in content-sharing feature.

“What makes this case effective is not a sophisticated exploit, but the way social engineering is wrapped in a familiar AI context,” said Vladimir Gursky, Malware Analyst at Kaspersky. “A sponsored link leads to a well-formatted page on a trusted domain, and the ‘installation guide’ is just a single Terminal command. For many users, that combination of trust and simplicity is enough to bypass their usual caution, yet the result is full compromise of the system and long-term access for the attacker.”

Kaspersky recommends that users:

  • Treat any unsolicited “guide” that asks them to run Terminal or PowerShell commands with caution, especially when it involves copying and pasting a one-line script from a website, document, or chat.
  • Close pages or delete messages that ask for such actions if the instructions are unclear, and seek advice from a knowledgeable source before proceeding.
  • Consider pasting any suspicious commands into a separate AI or security tool to understand what the code does before executing it.
  • Install and maintain reputable security software on all devices, including macOS and Linux systems, such as Kaspersky Premium, to detect and block infostealers and related payloads.
spot_img
spot_img

━ More like this

The energy sector’s ‘digital big bang’: 75% to digitise in two years, but at what cost?

A recent joint study by Kaspersky and VDC revealed that over half of energy organisations have already faced cyber incidents exceeding $1 million in...

Gaps in cybersecurity policies and employee commitment leave organisations vulnerable, Kaspersky survey shows

A recent Kaspersky survey in the Middle East, Turkiye and Africa (META) region entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that 23%...

69% of businesses ready to share their contractors’ security costs to boost cyber resilience

A new global Kaspersky study has revealed that more than two-thirds of companies are willing to invest in the security of their contractors and...

Why your password may not be good enough no matter how long and complex it is

The first Thursday of May each year marks ‘World Password Day’, a global event dedicated to raising awareness about the importance of securing passwords...

You Have Been Storm’ed

Everyone at some point clicks something they should not have. An email link without thinking. Or, in a rush, you click a web or...
spot_img