Tuesday, May 19, 2026
  • About
  • Advertise
  • Careers
  • Contact
NewsTrendsKE
  • Business
    • Deals
  • OpEds
  • Sustainability
  • Women in Business
  • Lifestyle
  • Featured
  • Technology
    • Phones
  • Sports
  • World
  • Contact Us
No Result
View All Result
NewsTrendsKE
No Result
View All Result

Home » Technology » Kaspersky uncovers macOS infostealer campaign abusing ChatGPT’s chat-sharing feature

Kaspersky uncovers macOS infostealer campaign abusing ChatGPT’s chat-sharing feature

5 months ago
in Technology
Reading Time: 3 mins read
A A
Person in White Long Sleeve Shirt Using Macbook Pro /Pexels

Person in White Long Sleeve Shirt Using Macbook Pro /Pexels

Share on FacebookShare on TwitterShare on WhatsApp

Kaspersky Threat Research has identified a new malware campaign that uses paid Google search ads and shared conversations on the official ChatGPT website to trick Mac users into running a command that installs the AMOS (Atomic macOS Stealer) infostealer and a persistent backdoor on their devices. 

In the campaign, attackers buy sponsored search ads for queries such as “chatgpt atlas” and direct users to a page that appears to be an installation guide for “ChatGPT Atlas for macOS” hosted at chatgpt.com. In reality, the page is a shared ChatGPT conversation generated through prompt engineering and then sanitised so that only the step-by-step “installation” instructions remain. The guide instructs users to copy a single line of code, open Terminal on macOS, paste the command, and grant all requested permissions.

Also Read

More than 50% of leaked passwords end with a number, Kaspersky’s latest research reveals

11 May 2026

Over a million banking accounts compromised as financial threats move to credential theft

13 April 2026
Load More

Kaspersky researchers analysis shows that the command downloads and executes a script from the external domain atlas-extension[.]com. The script repeatedly prompts the user for their system password and validates the password by attempting to run system commands. Once the correct password is supplied, the script downloads the AMOS infostealer, uses the stolen credentials to install it, and launches the malware. The infection flow represents a variation of the so-called ClickFix technique, in which users are persuaded to manually execute shell commands that retrieve and run code from remote servers.

After installation, AMOS collects data that can be monetised or reused in later intrusions. The malware targets passwords, cookies, and other information from popular browsers, data from cryptocurrency wallets such as Electrum, Coinomi, and Exodus, and information from applications including Telegram Desktop and OpenVPN Connect. It also searches for files with TXT, PDF, and DOCX extensions in the Desktop, Documents, and Downloads folders, as well as files stored by the Notes application, then exfiltrates this data to attacker-controlled infrastructure. In parallel, the attack installs a backdoor that is configured to start automatically on reboot, gives remote access to the compromised system, and duplicates much of AMOS’s data-collection logic.

The campaign reflects a broader trend in which infostealers have become one of 2025’s fastest-growing threats, with attackers actively experimenting with AI-related themes, fake AI tools, and AI-generated content to increase the credibility of their lures. Recent waves have included fake AI browser sidebars and fraudulent clients for popular models; the Atlas-themed activity extends this pattern by abusing a legitimate AI platform’s built-in content-sharing feature.

“What makes this case effective is not a sophisticated exploit, but the way social engineering is wrapped in a familiar AI context,” said Vladimir Gursky, Malware Analyst at Kaspersky. “A sponsored link leads to a well-formatted page on a trusted domain, and the ‘installation guide’ is just a single Terminal command. For many users, that combination of trust and simplicity is enough to bypass their usual caution, yet the result is full compromise of the system and long-term access for the attacker.”

Kaspersky recommends that users:

  • Treat any unsolicited “guide” that asks them to run Terminal or PowerShell commands with caution, especially when it involves copying and pasting a one-line script from a website, document, or chat.
  • Close pages or delete messages that ask for such actions if the instructions are unclear, and seek advice from a knowledgeable source before proceeding.
  • Consider pasting any suspicious commands into a separate AI or security tool to understand what the code does before executing it.
  • Install and maintain reputable security software on all devices, including macOS and Linux systems, to detect and block infostealers and related payloads.
Tags: ChatGPTKasperskyMacOSvirus
Previous Post

Isaiah 41:10 Named Kenya’s Verse of the Year as Bible Engagement Hits Record Highs – YouVersion

Next Post

Africa Logistics Properties announces launch of Real Estate Investment Trust – ALP REIT

Related Posts

Technology

More than 50% of leaked passwords end with a number, Kaspersky’s latest research reveals

11 May 2026
Technology

Over a million banking accounts compromised as financial threats move to credential theft

13 April 2026
Health

World Health Day: Kaspersky Flags Rising Cyber Risks in Telemedicine and Digital Healthcare

7 April 2026
Copilot Microsoft
Technology

Exabeam Confronts AI Insider Threats Extending Behavior Detection and Response to OpenAI ChatGPT and Microsoft Copilot

2 April 2026
Absa Kenya

Absa Wins Best Retail Bank Award as Digital Banking Growth Accelerates

18 May 2026

The Hospital Bill You Never Planned For: Why CoverBora Could Be the Smartest Health Decision You Make

18 May 2026
NewsTrendsKE

Enlit Africa 2026 makes 20 May the Commercial and Industrial (C&I) delivery day across power, water and clean energy hubs

16 May 2026
IFC Managing Director Makhtar Diop

AIM2030: Nairobi Launch Sets Stage for Africa’s Pharmaceutical Manufacturing Boom

13 May 2026
Exabeam

Exabeam Partners with Tuwaiq Academy to Develop Cybersecurity Talent Across 40,000+ Students in Saudi Arabia

18 May 2026

Jimmy Mbogo Joins Citizen TV

8 January 2024
NewsTrendsKE

NewsTrendsKE

A News Blog For Readers Who Want More

Follow us on social media:

  • About
  • Advertise
  • Careers
  • Contact

©2026 NewsTrendsKE.

No Result
View All Result
  • Business
    • Deals
  • OpEds
  • Sustainability
  • Women in Business
  • Lifestyle
  • Featured
  • Technology
    • Phones
  • Sports
  • World
  • Contact Us

©2026 NewsTrendsKE.

Go to mobile version