Close Menu
The Politics
    What's Hot

    What Happens to Your Blood Sugar and Inflammation When You Eat Cherries Regularly

    September 12, 2025

    Utah Father Turns In Alleged Charlie Kirk Assassin Tyler Robinson

    September 12, 2025

    ‘Wars, disasters, displacement, hunger’ continue to burden Myanmar

    September 12, 2025
    Facebook X (Twitter) Instagram
    • Demos
    • Politics
    • Buy Now
    Facebook X (Twitter) Instagram
    The Politics
    Subscribe
    Friday, September 12
    • Home
    • Breaking
    • World
      • Africa
      • Americas
      • Asia Pacific
      • Europe
    • Sports
    • Politics
    • Business
    • Entertainment
    • Health
    • Tech
    • Weather
    The Politics
    Home»Tech»Cybercriminals deploy Shamos malware through fake Mac repair sites
    Tech

    Cybercriminals deploy Shamos malware through fake Mac repair sites

    Justin M. LarsonBy Justin M. LarsonSeptember 12, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link


    NEWYou can now listen to Fox News articles!

    A dangerous new malware campaign is targeting Mac users worldwide. Security researchers at CrowdStrike uncovered Shamos, a new variant of the Atomic macOS Stealer (AMOS), developed by a cybercriminal group called COOKIE SPIDER.

    The attack relies on ClickFix tactics, where victims searching for Mac troubleshooting help are lured to fake websites or GitHub repositories. These spoofed sites trick users into copying and pasting a one-line command in Terminal, supposedly to fix an error. Instead, the command silently downloads Shamos, bypasses macOS Gatekeeper protections, and installs the malware.

    Once inside, Shamos searches for sensitive data, Apple Notes, Keychain items, browser passwords, and even cryptocurrency wallets. The stolen information is zipped and sent directly to attackers, often alongside additional malware like botnet modules or fake Ledger wallet apps.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    A suspicious link on Google

    Malicious sponsored results can be seen on Google search. (CrowdStrike)

    How Shamos malware spreads on macOS

    Cybercriminals distribute these fake “fixes” through so-called “malvertising” campaigns and spoofed tech help sites with names like mac-safer[.]com or rescue-mac[.]com. These pages pose as trusted troubleshooting guides and appear in search results for common Mac issues, such as “how to flush resolver cache.”

    The websites encourage victims to copy and paste commands that download malicious Bash scripts. These scripts grab the user’s password, remove file protections, and launch Shamos. With persistence tools installed, the malware can even restart alongside the system, keeping control long after the initial infection.

    CAPTCHAGEDDON SIGNALS A DANGEROUS SHIFT

    A fake Mac help page

    A fake help page provides victims with false instructions about how to fix problems with their Mac computer. (CrowdStrike)

    Tips to stay safe from Shamos malware

    You can avoid falling victim to Shamos and similar threats with these proactive steps:

    1) Never run commands you don’t understand

    Copy-pasting commands into Terminal may seem like an easy fix, but it’s also one of the easiest ways for attackers to bypass Apple’s built-in protections. If you see a command on a website, forum, or GitHub repository, don’t execute it unless you fully understand what it does. Instead, confirm with Apple’s official support site or the Apple Community forums, where experienced users and moderators can verify safe troubleshooting steps.

    2) Avoid sponsored results

    Hackers know that when your Mac has a problem, you’ll search for a quick solution. That’s why they buy sponsored ads like the one below to push fake troubleshooting websites higher in search results. Clicking the top link may feel natural, but it could be a trap. Stick with trusted sources like Apple Support, or scroll past the ads to find legitimate guides.

    CLICK HERE TO GET THE FOX NEWS APP 

    A fake webpage on how to fix a printer

    Fake instructions on how to fix printer issues on macOS. (CrowdStrike)

    3) Be wary of GitHub projects

    GitHub is an amazing resource for developers, but it’s also become a hotspot for malicious repositories that mimic legitimate software. Attackers often clone popular apps or tools, then hide malware inside. Before downloading anything, check the publisher’s name, stars, and activity history. If the account looks suspicious, inactive, or brand-new, avoid it.

    4) Use strong antivirus protection

    Mac malware is evolving fast, and Apple’s built-in security features can’t catch everything. A strong antivirus adds another layer of defense by scanning downloads, blocking malicious scripts, and detecting suspicious behavior in real time. Some security tools can even spot the one-line Terminal commands used by Shamos before they cause harm.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    5) Use a personal data removal service

    Since Shamos is designed to steal personal information and send it to cybercriminals, reducing your online footprint can help limit the fallout. A personal data removal service scans data broker sites and removes your exposed information, making it harder for attackers to resell or exploit it after a breach. While this won’t stop malware from stealing what’s on your Mac, it adds another layer of protection by minimizing the data criminals can use against you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan 

    6) Keep macOS updated

    Apple regularly patches vulnerabilities in macOS that malware tries to exploit. By keeping your system up to date, you close the doors that attackers rely on. Enable automatic updates, so your Mac receives the latest patches as soon as they’re available. Pairing this with good digital hygiene, like avoiding shady downloads, dramatically lowers your risk of infection.

    Kurt’s key takeaways

    Cybercriminals know that when your Mac breaks, you’ll look for quick answers. Shamos takes advantage of that urgency by disguising itself as help. Staying safe means slowing down before you copy, paste, or download anything. If something feels off, it probably is.

    Should Apple be doing more to protect Mac users from evolving threats like Shamos? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.



    Source link

    Related

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    Justin M. Larson
    • Website

    Related Posts

    Tech

    Fable gets Amazon funding for AI-powered user-created animated shows

    September 12, 2025
    Tech

    Apple raises iPhone prices despite getting Trump tariff break relief

    September 11, 2025
    Tech

    ‘Leopard spots’ found on rock on Mars are clearest sign life once existed on red planet, NASA says | Science, Climate & Tech News

    September 10, 2025
    Tech

    2-story 3D concrete printed home finished in 5 months near Perth, Australia

    September 10, 2025
    Tech

    Why retirees are prime targets for identity theft and credit fraud

    September 10, 2025
    Tech

    Lizard gives birth without mating in ‘one of rarest events in animal kingdom’ | UK News

    September 10, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    • Africa
    • Americas
    • Asia Pacific
    • Breaking
    • Business
    • Economy
    • Entertainment
    • Europe
    • Health
    • Politics
    • Politics
    • Sports
    • Tech
    • Top Featured
    • Trending Posts
    • Weather
    • World
    Economy News

    What Happens to Your Blood Sugar and Inflammation When You Eat Cherries Regularly

    Justin M. LarsonSeptember 12, 20250

    While all cherries are low in calories and provide vitamin C, antioxidants, and anti-inflammatory compounds,…

    Utah Father Turns In Alleged Charlie Kirk Assassin Tyler Robinson

    September 12, 2025

    ‘Wars, disasters, displacement, hunger’ continue to burden Myanmar

    September 12, 2025
    Top Trending

    What Happens to Your Blood Sugar and Inflammation When You Eat Cherries Regularly

    Justin M. LarsonSeptember 12, 20250

    While all cherries are low in calories and provide vitamin C, antioxidants,…

    Utah Father Turns In Alleged Charlie Kirk Assassin Tyler Robinson

    Justin M. LarsonSeptember 12, 20250

    Melania, Ivanka, Arnold Schwarzenegger & Hollywood Grieve Loss Of ‘Turning Point’ CEO…

    ‘Wars, disasters, displacement, hunger’ continue to burden Myanmar

    Justin M. LarsonSeptember 12, 20250

    Four years after the military coup which deposed the democratically elected government,…

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    Advertisement
    Demo
    Editors Picks

    Review: Record Shares of Voters Turned Out for 2020 election

    January 11, 2021

    EU: ‘Addiction’ to Social Media Causing Conspiracy Theories

    January 11, 2021

    World’s Most Advanced Oil Rig Commissioned at ONGC Well

    January 11, 2021

    Melbourne: All Refugees Held in Hotel Detention to be Released

    January 11, 2021
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Editors Picks

    What Happens to Your Blood Sugar and Inflammation When You Eat Cherries Regularly

    September 12, 2025

    Utah Father Turns In Alleged Charlie Kirk Assassin Tyler Robinson

    September 12, 2025

    ‘Wars, disasters, displacement, hunger’ continue to burden Myanmar

    September 12, 2025

    Boeing Workers in St. Louis Reject Tentative Contract

    September 12, 2025
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    News

    • World
    • US Politics
    • EU Politics
    • Business
    • Opinions
    • Connections
    • Science

    Company

    • Information
    • Advertising
    • Classified Ads
    • Contact Info
    • Do Not Sell Data
    • GDPR Policy
    • Media Kits

    Services

    • Subscriptions
    • Customer Support
    • Bulk Packages
    • Newsletters
    • Sponsored News
    • Work With Us

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 The Politics Designed by The Politics.
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.