BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

New Atomic Stealer Campaign Targets macOS via Fake CAPTCHA Pages

Fake Security Checks Used in New Malware Campaign to Target macOS Users with Atomic Stealer

  • New Malware campaign targets macOS users through fake security checks on websites.
  • Attackers use typosquat domains resembling a major U.S. telecom provider to spread Atomic macOS Stealer (AMOS).
  • The campaign applies the “ClickFix” tactic, instructing users to run malicious commands after phony CAPTCHA failures.
  • Russian-speaking Hackers are likely involved based on language found in the malware’s code.
  • Other similar tactics use imitation CAPTCHA pages for delivering additional malware to users on multiple platforms.

Cybersecurity researchers have identified a new malware campaign targeting Apple macOS users by imitating security checks on websites and tricking them into installing malicious software. The campaign relies on fake domains that resemble those of a major U.S. telecom provider, aiming to distribute the Atomic macOS Stealer (AMOS) malware.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

According to CloudSEK, attackers direct users to fraudulent websites such as “panel-spectrum[.]net” and “spectrum-ticket[.]net” that prompt visitors to complete a fake hCaptcha verification. When users attempt the verification, they receive an error message and instructions to perform an “Alternative Verification.” This action results in copying a malicious command to the user’s clipboard and providing OS-specific guidance for running it.

Security researcher Koushik Pal explains that the script used on macOS systems steals system passwords and downloads the AMOS malware payload. Pal adds, “The script uses native macOS commands to harvest credentials, bypass security mechanisms, and execute malicious binaries.” Russian-language comments in the code suggest Russian-speaking cybercriminals are likely behind the attack.

The campaign demonstrates signs of quick assembly, with mismatched instructions and programming errors found across its delivery sites. In some cases, the websites instructed both Windows and Mac users to use Windows-specific commands, highlighting flaws in the setup. The approach is part of a broader trend, with many recent attacks employing “ClickFix”—a social engineering method that prompts victims to run commands after a staged CAPTCHA failure or security prompt.

Darktrace reports a rise in such campaigns, noting that actors often use spear phishing, drive-by compromises, or abuse trust in known platforms to spread malware. In an April 2025 incident, attackers used ClickFix to deploy payloads for deeper penetration, lateral movement, and data exfiltration.

- Advertisement -

These campaigns often feature fake versions of familiar CAPTCHA services, like Google reCAPTCHA or Cloudflare Turnstile, and can sometimes be embedded in compromised legitimate sites. According to Daniel Kelley from SlashNext, attackers exploit user “verification fatigue”—the tendency to perform routine security actions without scrutiny—making this technique especially effective.

Payloads delivered through these attacks can include various stealers and remote access trojans (RATs) such as Lumma, StealC, and NetSupport RAT, enabling attackers to obtain sensitive data from infected systems.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Crypto Payments Double in Australia Despite Banking Hurdles

In 2026, 12% of Australians used crypto for goods and services, a significant rise...

Meta Shuts Down Virtual Reality Horizon Worlds in June

Meta Platforms will shut down its Horizon Worlds Metaverse for VR users in June,...

Bitrefill hacked by Lazarus Group-linked cyberattack

Bitrefill, a crypto e-commerce platform, was attacked on March 1 by Hackers with methods...

NVIDIA’s DLSS 5 Sparks Backlash Over “AI Art” Changes

NVIDIA unveiled DLSS 5 at GTC 2026, marking a shift from performance upscaling to...

Poloniex’s $1.3B BTC Reserve Shortfall Exposed

Poloniex announced fee-free trading for members of its "Poloniex Super" program, but did not...

Must Read

What Are Anonymous Debit Cards And How Do They Work?

You've heard about anonymous debit cards, but what are they really? Anonymous Debit Cards are cards that let you make purchases without revealing your...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading