HomeNewsNew ClickFix variant bypasses Apple safeguards with one‑click on script execution

New ClickFix variant bypasses Apple safeguards with one‑click on script execution

The researchers identified that the conduct of the Script Editor might range relying on the macOS model. “On latest variations of macOS Tahoe, a further warning immediate is introduced, requiring the consumer to permit the script to be saved to disk earlier than execution,” they stated.

Light-weight staging for Atomic Stealer

As soon as executed, the AppleScript resolves to an obfuscated shell command. That command decodes a hidden URL, retrieves a distant payload utilizing ‘curl’, and executes it through ‘zsh’. From right here, commonplace info-stealing takes over with a ‘Mach-O’ binary written to a short lived location, its attributes adjusted, permissions set, and execution triggered.

This binary is a brand new variant of the Atomic Stealer.

The researchers famous that the staging strategy retains the preliminary script minimal and fewer detectable, whereas the precise malicious logic arrives individually. It’s modular, fast to replace, and more durable to catch on the first stage.

See also  Way forward for proposed US cybersecurity healthcare payments unsure
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular