Atomic Stealer Malware Bypasses macOS Warnings with New 'ClickFix' Attack Vector

Atomic Stealer Evolves 'ClickFix' Tactic to Target macOS Users via Apple's Script Editor

HIGH
April 9, 2026
4m read
MalwarePhishingMobile Security

Related Entities

Organizations

Apple Jamf Threat Labs

Products & Tech

macOSApple Script Editor

Full Report

Executive Summary

Threat actors distributing the Atomic Stealer (AMOS) infostealer have adapted their tactics to bypass recent security enhancements in macOS. According to researchers at Jamf Threat Labs, a new campaign is using an evolved version of the "ClickFix" social engineering attack. Instead of tricking users into pasting malicious commands into the Terminal, which now triggers a security warning in macOS 26.4, the attackers now guide victims to use Apple's built-in Script Editor. This demonstrates the continuous cat-and-mouse game between platform vendors and malware authors, where attackers quickly find alternative paths to achieve their goals once a vector is closed.


Threat Overview

Atomic Stealer is a potent infostealer designed specifically to target macOS, capable of harvesting a wide range of sensitive data, including browser passwords, cookies, crypto wallets, and system information. The "ClickFix" attack is a social engineering method that relies on deception rather than a software vulnerability.

The new attack chain is as follows:

  1. Lure: The victim encounters a full-window browser pop-up that convincingly mimics an official Apple system alert. The pop-up claims to offer a way to reclaim disk space or fix a system issue.
  2. Social Engineering: The user is guided through a series of steps, presented as a legitimate troubleshooting process.
  3. Vector Switch: Instead of instructing the user to open the Terminal, the instructions now direct them to open the Script Editor application, which is included with macOS.
  4. Execution: The user is told to paste a block of malicious code (likely AppleScript or a shell script wrapper) into the Script Editor and run it. Since Script Editor is a trusted Apple application designed to run code, it does not trigger the same warnings as pasting into the Terminal.
  5. Payload Delivery: Running the script downloads and installs the AMOS infostealer and a backdoor for persistent access.

Technical Analysis

This campaign is a clear example of attackers adapting to new defenses. Apple's introduction of a warning for pasting commands into the Terminal in macOS 26.4 was a meaningful security improvement. However, the attackers simply pivoted to another built-in application that can execute code.

  • Abuse of Trusted Application: The core of the technique is abusing the inherent trust and functionality of Script Editor. This aligns with T1204.001 - User Execution: Malicious Link and T1204.002 - User Execution: Malicious File, as the user is the one who ultimately executes the code.
  • AppleScript/Shell Script: The payload pasted into Script Editor is likely an AppleScript that contains a do shell script command. This allows the attacker to execute arbitrary shell commands to download and run the main AMOS binary, a technique covered under T1059.002 - Command and Scripting Interpreter: AppleScript.
  • Defense Evasion: By using Script Editor, the attackers successfully bypass the specific defense Apple implemented for the Terminal, a classic defense evasion tactic.

Impact Assessment

A successful infection with Atomic Stealer can lead to a complete compromise of the victim's digital life and credentials.

  • Credential Theft: AMOS can steal passwords, cookies, and session tokens from all major browsers, giving attackers access to email, social media, banking, and corporate accounts.
  • Financial Theft: The malware specifically targets cryptocurrency wallets, enabling direct financial theft.
  • Full System Access: The installation of a backdoor provides the attacker with persistent access to the compromised Mac, allowing them to install further malware, spy on the user, or use the machine as part of a botnet.

IOCs

No specific IOCs were provided in the summary articles.

Detection & Response

Detection relies on monitoring for the execution of suspicious scripts and outbound network connections.

  1. Process Monitoring: Use an EDR or security agent for macOS to monitor for the execution of scripts via Script Editor (osascript process). Look for scripts that make outbound network connections or write files to disk.
  2. Network Monitoring: Monitor for network connections to known AMOS C2 servers. Threat intelligence feeds should be updated with the latest indicators for this malware family.
  3. Unified Logging: Use macOS's unified logging system to search for events related to osascript execution and file creation in suspicious directories like /tmp/ or ~/Library/LaunchAgents/.

D3FEND Reference: Detection would involve D3-PA - Process Analysis to watch for osascript spawning shell processes that download files, and D3-NTA - Network Traffic Analysis to spot the C2 communication.

Mitigation

Since this is a social engineering attack, user awareness is the primary mitigation.

  • User Education: Train users to be extremely skeptical of any browser pop-up or message that instructs them to manually copy and paste code into any application, whether it's Terminal, Script Editor, or anything else. Legitimate troubleshooting rarely, if ever, involves this step.
  • Endpoint Protection (EPP/EDR): Deploy a modern EPP/EDR solution for macOS that can detect and block known malware like Atomic Stealer based on its behavior and signatures.
  • Principle of Least Privilege: Ensure users do not run with administrative privileges for daily tasks. While this attack doesn't require admin rights for the initial execution, it can limit the malware's ability to install persistent components.

D3FEND Reference: The most effective countermeasure is user-focused. While not a direct D3FEND technique, this aligns with the principle of hardening the human element. Technically, D3-EDL - Executable Denylisting could be used to block Script Editor for most users, but this is often not practical.

Timeline of Events

1
April 9, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective mitigation is training users to recognize the social engineering tactic and to never copy/paste code from an untrusted source into any application.

Deploy a reputable EDR/EPP solution for macOS that can detect and block Atomic Stealer and its behaviors.

Mapped D3FEND Techniques:

In high-security environments, consider using application control to block the use of Script Editor for all non-developer users.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter the evolved 'ClickFix' attack, defenders should use Process Analysis to monitor for the specific, anomalous behavior of the Apple Script Editor. A key detection rule would be to alert whenever the Script Editor's underlying process, osascript, executes a 'do shell script' command that involves network activity, such as curl or wget. This is a very strong indicator of a malicious script attempting to download a second-stage payload. Furthermore, an EDR solution should be configured to analyze the chain of events: Browser -> User launches Script Editor -> Script Editor process (osascript) spawns a shell -> Shell process makes a network connection. This behavioral chain is highly indicative of the AMOS campaign and allows for detection regardless of the specific script or payload hash.

Since this attack relies on abusing a legitimate, built-in macOS application, a powerful mitigation for corporate environments is to use Executable Denylisting. Most non-developer users have no legitimate reason to use the Apple Script Editor. Using an MDM solution or EDR platform, administrators can create a policy that prevents the execution of Script Editor.app for all users except those in a specific 'developer' group. This directly removes the tool that the attackers have pivoted to, forcing them to find yet another vector. While this may seem like a blunt instrument, it's an effective way to harden endpoints and reduce the attack surface by removing unnecessary, dual-use tools from standard user machines.

Sources & References

Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings
Infosecurity Magazine (infosecurity-magazine.com) April 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MalwaremacOSAtomic StealerAMOSSocial EngineeringClickFixInfostealer

📢 Share This Article

Help others stay informed about cybersecurity threats