Skip to content

SamuelWornop

Primary Menu
  • Home
  • Software
  • Cybersecurity
  • Artificial Intelligence
  • Home
  • 2025
  • June
  • 28
  • Risk Actors Use Clickfix Techniques to Deploy Malicious AppleScripts for Stealing Login Credentials
  • Cybersecurity

Risk Actors Use Clickfix Techniques to Deploy Malicious AppleScripts for Stealing Login Credentials

Samuelwornop June 28, 2025
Clickfix.webp.jpeg


In a current discovery by the CYFIRMA analysis staff, a complicated malware marketing campaign dubbed Odyssey Stealer has been uncovered, concentrating on macOS customers via a misleading technique generally known as Clickfix ways.

This marketing campaign leverages typosquatted domains malicious web sites mimicking reliable ones just like the macOS App Retailer, finance platforms, or cryptocurrency information portals to trick customers into executing dangerous AppleScripts (osascripts).

 Clickfix Tactics
macOS App Retailer area

These scripts are engineered to reap delicate information, together with browser cookies, saved passwords, cryptocurrency pockets info, and browser extensions, posing a extreme risk to people, significantly these engaged in monetary and crypto actions.

– Commercial –
Google News

Odyssey Stealer Targets macOS Customers

The operation, linked to a command-and-control (C2) panel primarily hosted in Russia, showcases a professional-grade information theft mechanism that prioritizes Western customers in the USA and the European Union whereas avoiding victims in CIS international locations, a sample typically related to Russian-aligned cybercriminal teams.

The Clickfix method begins with the creation of visually comparable or typosquatted domains designed to use consumer typing errors.

Upon visiting these malicious websites, customers are greeted with a pretend Cloudflare-style CAPTCHA immediate, accompanied by directions to repeat and paste a Base64-encoded command into their terminal.

In accordance with Cyfirma, this command fetches and executes a non-obfuscated osascript from servers like odyssey1[.]to or particular IP addresses, triggering a cascade of malicious actions.

 Clickfix Tactics
osascript

Finance and Crypto Fans at Excessive Danger

The script creates a short lived listing, reminiscent of /tmp/lovemrtrump, to retailer stolen information, copies macOS Keychain recordsdata for credential theft, and deploys pretend authentication prompts to seize consumer passwords.

It additional targets desktop cryptocurrency wallets like Electrum, Coinomi, and Exodus, alongside browser information from Chrome, Firefox, and Safari, extracting non-public keys, seed phrases, session tokens, and private recordsdata from Desktop and Paperwork folders.

The stolen information is then compressed right into a ZIP file (out.zip) and exfiltrated by way of a curl POST request to attacker-controlled servers, with persistent retry mechanisms making certain supply even underneath intermittent community situations.

Odyssey Stealer, a rebranded evolution of Poseidon Stealer and a fork of the AMOS Stealer, demonstrates superior capabilities within the macOS malware-as-a-service ecosystem.

Its management panel provides attackers a structured interface to handle contaminated units, customise malware builds, and hijack browser classes utilizing stolen cookies.

The malware’s give attention to over 100 browser extensions, significantly cryptocurrency-related ones like MetaMask, underscores its intent to maximise monetary acquire.

To fight this risk, organizations and people should undertake sturdy endpoint safety options, implement risk intelligence, and configure firewalls to dam identified malicious IPs and domains.

Steady community monitoring, behavior-based anomaly detection, and safety consciousness coaching are vital to mitigating dangers from such social engineering assaults.

As Odyssey Stealer continues to evolve underneath the suspected upkeep of “Rodrigo,” a key determine behind Poseidon and AMOS, vigilance and adaptive defenses stay paramount.

Indicators of Compromise (IoC)

Indicator Remarks
appmacosx[.]com Malicious area
financementure[.]com Malicious area
cryptoinfo-news[.]com Malicious area
odyssey1[.]to Odyssey C2 Panel
45[.]135.232.33 Odyssey C2 Panel
a0bdf6f602af5efea0fd96e659ac553e0e23362d2da6aecb13770256a254ef55 Apple Script

Continue Reading

Previous: A Full Information to Luxurious Purse App Improvement
Next: Google introduces new state-of-the-art open fashions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Stories

check_g1211896141.jpg
  • Cybersecurity

12 Prime DevSecOps Instruments to Safe Every Step of the SDLC

Samuelwornop June 27, 2025
breachforum-intelbroker-exposed-as-british-hacker-kai-west-4.jpg
  • Cybersecurity

How an E-mail, Crypto Pockets and YouTube Exercise Led the FBI to IntelBroker

Samuelwornop June 27, 2025
BreachForums2506-hero.jpg
  • Cybersecurity

Taking the shine off BreachForums – Sophos Information

Samuelwornop June 26, 2025

Recent Posts

  • Google introduces new state-of-the-art open fashions
  • Risk Actors Use Clickfix Techniques to Deploy Malicious AppleScripts for Stealing Login Credentials
  • A Full Information to Luxurious Purse App Improvement
  • Utilizing generative AI to assist robots bounce larger and land safely | MIT Information
  • 12 Prime DevSecOps Instruments to Safe Every Step of the SDLC

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025

Categories

  • Artificial Intelligence
  • Cybersecurity
  • Software

You may have missed

Gemma-social-share.width-1300.jpg
  • Artificial Intelligence

Google introduces new state-of-the-art open fashions

Samuelwornop June 28, 2025
Clickfix.webp.jpeg
  • Cybersecurity

Risk Actors Use Clickfix Techniques to Deploy Malicious AppleScripts for Stealing Login Credentials

Samuelwornop June 28, 2025
Blog-Banner-5-1.webp.webp
  • Software

A Full Information to Luxurious Purse App Improvement

Samuelwornop June 28, 2025
MIT-Jumping_Robot2028529.png
  • Artificial Intelligence

Utilizing generative AI to assist robots bounce larger and land safely | MIT Information

Samuelwornop June 28, 2025

SamuelWornop

Welcome to Nathan Armstrong—your trusted source for insightful content on Software, Cybersecurity, and Artificial Intelligence. At Nathan Armstrong, we are passionate about exploring the world of technology and sharing valuable insights that empower you to understand and navigate the ever-evolving digital landscape.

Categories

  • Software
  • Cybersecurity
  • Artificial Intelligence

Recent Posts

  • Google introduces new state-of-the-art open fashions
  • Risk Actors Use Clickfix Techniques to Deploy Malicious AppleScripts for Stealing Login Credentials
  • A Full Information to Luxurious Purse App Improvement
  • Utilizing generative AI to assist robots bounce larger and land safely | MIT Information
  • 12 Prime DevSecOps Instruments to Safe Every Step of the SDLC
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
Copyright © https://samuelwornop.site/ - All rights reserved. | MoreNews by AF themes.