HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

ClickFix Campaigns Use AppleScript Deep Links to Auto‑Run Atomic Stealer on macOS

ClickFix attackers have shifted from Terminal copy‑paste tricks to malicious AppleScript deep links that open Script Editor with a pre‑filled script, pulling the Atomic Stealer infostealer onto macOS devices. The change lowers user friction and expands the pool of potential victims, posing a heightened third‑party risk for organizations with Mac endpoints.

🛡️ LiveThreat™ Intelligence · 📅 April 11, 2026· 📰 malwarebytes.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
malwarebytes.com

ClickFix Campaigns Use AppleScript Deep Links to Auto‑Run Atomic Stealer on macOS

What Happened — ClickFix attackers have abandoned the classic “copy‑paste into Terminal” trick and now use the applescript:// URL scheme to launch Script Editor with a pre‑filled script that silently pulls the Atomic Stealer infostealer. The one‑click approach dramatically lowers the barrier for self‑inflicted infection on macOS devices.

Why It Matters for TPRM

  • The technique bypasses traditional user‑awareness controls that focus on Terminal commands.
  • It expands the attack surface of any third‑party macOS endpoint, potentially compromising corporate data.
  • Rapid evolution of the delivery method makes detection by static rules difficult.

Who Is Affected — macOS users across all sectors; especially enterprises that provide Mac laptops to employees, SaaS vendors with macOS‑based development environments, and endpoint‑security providers.

Recommended Actions — Review vendor endpoint‑security controls for macOS, enforce strict script‑execution policies, and conduct user‑awareness training that includes AppleScript deep‑link threats.

Technical Notes — Attack vector: malicious applescript:// deep link opened from a web page; payload: Atomic Stealer (AMOS) delivered via obfuscated curl | zsh chain. No CVE involved; the threat relies on social engineering rather than a software vulnerability. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/news/2026/04/clickfix-finds-new-way-to-infect-macs

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.