Skip to content
Tech News
← Back to articles

New macOS stealer campaign uses Script Editor in ClickFix attack

read original get MacScript Security Suite → more articles
Why This Matters

The new macOS ClickFix attack leverages the Script Editor to deliver the Atomic Stealer malware, bypassing traditional security measures and exploiting trusted system applications. This campaign highlights the evolving tactics cybercriminals use to target Mac users, emphasizing the need for improved defenses and user awareness. As malware delivery methods become more sophisticated, both industry and consumers must stay vigilant to protect sensitive data from theft.

Key Takeaways

A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix attack that tricked users into executing commands in Terminal.

Script Editor is a built-in macOS application for writing and running scripts, primarily AppleScript and JXA, that can execute local scripts and shell commands. It is a trusted application pre-installed on macOS systems.

While this is not the first time it has been abused for malware delivery, the researchers note that, in the context of the ClickFix social engineering technique, it does not require the victim to manually interact with the Terminal and execute commands.

Apart from the Terminal-based variant being widely reported, macOS Tahoe 26.4 added protection against ClickFix attacks in the form of a warning when trying to execute commands.

In a new campaign distributing Atomic Stealer observed by security researchers at Jamf, the hackers target victims with fake Apple-themed sites that pose as guides to help reclaim disk space on their Mac computers.

These pages contain legitimate-looking system cleanup instructions but use the applescript:// URL scheme to launch Script Editor with a pre-filled executable code.

Prompt to open the Script Editor by the malicious web page

Source: Jamf

The malicious code runs an obfuscated ‘curl | zsh’ command, which downloads and executes a script directly in system memory.

This decodes a base64 + gzip payload, downloads a binary (/tmp/helper), removes security attributes via ‘xattr -c,’ makes it executable, and runs it.

... continue reading