Recent cybersecurity research has exposed a sophisticated malware campaign targeting macOS users through a technique dubbed “Clickfix.”
This attack leverages malicious AppleScripts (osascripts) to siphon sensitive data, including browser cookies, passwords, cryptocurrency wallet details, and browser plugin information.
The operation, attributed to a rebranded infostealer known as Odyssey Stealer, highlights the growing threat landscape for Mac users, particularly those involved in finance and cryptocurrency.
The Clickfix technique begins with the creation of typosquatted or visually similar domains, often mimicking official Apple App Store, finance, or cryptocurrency news sites.
When users inadvertently visit these domains, they encounter a fake Cloudflare-style CAPTCHA prompt. Beneath this prompt, instructions are displayed for macOS users to copy a command and paste it into their terminal.
If accessed from a Windows device, the site provides Windows-specific instructions; however, the malware is currently focused on macOS.
Once users copy and paste the Base64-encoded command into their terminal, the script fetches and executes a lengthy AppleScript from a command-and-control (C2) server (such as odyssey1[.]to or 45[.]135.232.33).
This script is not heavily obfuscated, allowing straightforward analysis by security researchers. Upon execution, it presents a fake authentication prompt designed to capture the user’s password.
To validate stolen credentials silently, it uses the macOS dscl command with the authonly parameter, ensuring the process remains hidden.
The malware script uses the mkdir -p A command to create nested directories within /tmp (notably /tmp/lovemrtrump) for storing collected data. It copies macOS Keychain files to these directories, enabling decryption if the user’s password is captured.
The script also targets desktop wallets (such as Electrum, Coinomi, and Exodus), browser data from Chrome, Firefox, and Safari, as well as over 100 browser extensions, particularly cryptocurrency wallets like MetaMask.
For Chromium-based browsers, the malware extracts private keys, seed phrases, session tokens, and password manager configurations.
Firefox users are vulnerable to theft via the logins.json file, which is decrypted using the key4.db file. Safari users risk losing cookies, autofill data, and browsing history.
The script compiles stolen data—including browser histories, wallets, and personal documents into a ZIP file (out.zip) and exfiltrates it to the attacker’s server using a curl POST request.
If the upload fails, the script retries up to 10 times with 60-second delays, ensuring persistent data delivery. Hard-coded headers (build ID, username) are used to tag stolen data for tracking.
To counter the Odyssey Stealer and similar threats, organizations are advised to implement robust endpoint security solutions, network intrusion detection/prevention systems (NIDS/NIPS), and web application firewalls.
Firewalls should block outbound communications to known malicious IPs and domains. Behavior-based monitoring can detect unusual activity, while application whitelisting prevents unauthorized executables from running.
Users should only install apps from the official Mac App Store or verified developer sites and avoid running scripts from untrusted sources.
Security awareness training is crucial to prevent social engineering attacks. Organizations should also develop comprehensive incident response plans to isolate and remediate affected systems quickly.
In summary, the Clickfix tactic demonstrates how threat actors exploit user trust and technical sophistication to harvest credentials and sensitive data. Vigilance, robust security controls, and user education remain the best defenses against these evolving threats.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…