Clickfix, a social engineering strategy, has been targeting both Windows and Mac users since early 2024. Recently, researchers uncovered how attackers were manipulating fake Captcha prompts to deceive Windows users into installing malware. Now, a similar approach is being aimed at users in Macau. Cybersecurity analysts have identified a new campaign leveraging Clickfix to distribute a potent malware known as Atomic MacOS Stealer (AMOS), specifically designed to extract data from Apple devices.
CloudSek, a security research firm, has highlighted the dangers posed to MacOS users through techniques that involve imitation and trickery. In this case, the attackers impersonate Spectrum, the leading telecommunications provider in the U.S., creating a fraudulent website that closely resembles the legitimate support portal. Users visiting these fake sites encounter a standard Captcha box demanding verification. However, if users comply, they’ll receive an error message stating the Captcha validation failed. They are then prompted to click on a button for “Alternative Validation,” which deceptively copies a malicious command to their clipboard. Depending on their operating system, users might unwittingly paste and run this command in their terminal, which is actually a script designed to steal sensitive information and install malware.
The risky scripts utilize legitimate MacOS commands, requesting system passwords, and ultimately downloading the AMOS malware, which is notorious for siphoning sensitive data including passwords and cryptocurrency keys. Researchers have speculated that this operation is linked to Russian-speaking attackers, given the Russian comments found in the malware’s code. They also noted various inconsistencies in the malware delivery, including mismatched instructions for different operating systems.
Understanding Clickfix Malware and Its Operation
Clickfix is gaining traction among cybercriminals, exploiting users’ trust in what appears to be legitimate online actions. The overarching goal of this method is to enable victims to initiate their own compromise, bypassing conventional exploit techniques entirely. Observers noted that Clickfix has been in play since at least March 2024. Previous reports documented its evolution, such as a campaign that tricked users into executing harmful PowerShell commands through fake error messages encountered on well-known software.
By November 2024, these scams had further advanced, targeting users of platforms like Google Meet through phishing emails posing as internal communications from their own organizations. The emails led to deceptive landing pages, making the malicious intent less obvious.
Protecting Against Clickfix and Similar Malware
To protect yourself against the evolving Clickfix threats, consider these six strategies:
- Be wary of Captcha prompts. If prompted to paste something into your terminal, it’s a red flag. Close the page immediately.
- Avoid clicking links from unverified emails. Many attacks start this way, so always verify the sender before clicking on any link.
- Enable two-factor authentication. This adds an extra layer of protection by requiring a secondary code sent to your phone.
- Keep your device updated. Regular updates can protect against known vulnerabilities that cybercriminals exploit.
- Monitor your accounts. Check for suspicious activities and change your passwords if necessary.
- Consider data deletion services. These services notify you about potential misuse of your personal information, allowing for proactive management of your privacy.
Even experienced users remain at risk if they overlook the masked malicious behaviors. Since this attack preys on familiar online interactions, vigilance becomes crucial. Users should maintain a healthy skepticism about seemingly normal prompts, especially when they ask for sensitive information.





