Breaking 17:30 Trump’s Iran strikes represent major foreign policy gamble 17:19 Israel launches new wave of strikes in central Iran 16:45 Iranian state channel removes report of Khamenei’s “Imminent Speech” 16:07 Hezbollah condemns Israeli strikes and expresses solidarity with Iran 16:00 Trump and Netanyahu hold phone talks amid joint action on Iran 15:34 UN Security Council holds emergency meeting following US-Iran tensions 14:08 Russia and Iran discuss diplomatic measures amid US-Israel strikes 13:22 Five explosions heard in Dubai amid unclear circumstances 13:09 Global leaders voice concern after US and Israeli strikes on Iran 13:00 Middle East crisis deepens as 51 die in strike on Iranian school 12:57 Jack Doohan reveals death threats before Alpine exit 12:51 Israeli airstrikes kill seven Palestinians as Gaza truce weakens 12:46 Conflicting reports emerge after US-Israel strikes across Iran 12:40 UN human rights chief urges restraint after strikes on Iran 12:39 UK convenes emergency meeting after US-Israeli airstrikes on Iran 12:32 Sánchez calls for de-escalation and dialogue amid rising middle east tensions 12:31 BlackRock withdraws $717 million in Bitcoin from Coinbase in three days 12:26 China rejects US nuclear test claim and accuses Washington of undermining global stability 12:21 Macron calls for urgent UN meeting as tensions escalate between US, Israel and Iran 12:20 Exiled prince urges Iranians to prepare for post strike uprising 12:16 WIT Studio sparks fan speculation with new Attack on Titan visual 12:10 Death toll rises to 40 after strike on girls’ school in Southern Iran 12:09 Saudi Aramco halts crude supply to Pakistan as global oil flows shift 12:00 Gulf states raise oil output as Iran tensions escalate 12:00 Pro-Iran group threatens imminent attacks on US bases in Iraq 11:37 Houthis resume Red Sea attacks after US-Israeli strikes on Iran 11:31 Israel and Iran strikes push Lebanon closer to wider regional war 11:26 Middle East evacuations deepen as iran tensions rise 11:14 Israeli strikes target Iran’s top leadership in Tehran 11:02 Global leaders urge restraint after US and Israeli strikes on Iran trigger regional backlash 10:50 UAE on high alert as regional tensions disrupt airspace 10:40 US embassies across Middle East tell Americans to shelter in place after Iranian missile strikes 10:20 US mission in UAE urges Americans to shelter in place amid regional hostilities 09:20 China expands arms support to Iran amid U.S. military buildup 08:50 Bahrain urges residents to seek shelter after Manama blasts 08:20 Explosions reported in Manama after Iran strikes US Fifth Fleet base 07:50 Six planets to align in weekend sky event 07:20 Pentagon labels Anthropic a supply chain risk after AI guardrail clash 07:00 Bitcoin falls below $64,000 after US and Israel launch strikes on Iran 18:00 NASA adds test mission to Artemis program ahead of astronaut moon landing

Chatgpt share feature abused to spread atomic macos stealer

Wednesday 10 December 2025 - 13:20
Chatgpt share feature abused to spread atomic macos stealer

Cybercriminals are weaponizing ChatGPT’s chat sharing feature in a new campaign that installs Atomic macOS Stealer, also known as AMOS, on Apple computers while posing as a guide to a fake “Atlas browser” for macOS. The operation targets a broad audience of macOS users and cybersecurity conscious professionals who rely on search engines and official looking resources to discover new tools and troubleshoot technical issues.​

How the chatgpt share feature is abused

Security analysts report that attackers are publishing polished installation guides for a non existent Atlas browser as shared conversations hosted on the official chatgpt.com domain. These shared chats are stripped of suspicious context and presented as legitimate step by step instructions, making them appear trustworthy to users who reach them via search.​

To drive traffic, the threat actors buy Google ads targeting terms such as “chatgpt atlas,” sending users to chatgpt.com/share URLs that look indistinguishable from genuine OpenAI content. Once on the page, victims are told to copy a single command into the macOS Terminal, framed as a standard installation step for the supposed browser.​

From one line command to full system compromise

The command shown in the shared chat retrieves and runs a script hosted on the domain atlas-extension.com, which acts as the delivery mechanism for AMOS. The script repeatedly prompts the user for their macOS password and, once the correct credentials are provided, uses them to install the malware with elevated privileges and to set up persistence.​

Researchers describe this social engineering method as a variation of the ClickFix technique, in which users are convinced to execute a command presented as a fix, update, or optimization rather than as a threat. In this case, curiosity around an apparently new ChatGPT linked browser is used to override normal caution, especially among users accustomed to pasting commands from technical guides.​

Amos infostealer and its new persistent backdoor

Once installed, Atomic macOS Stealer focuses on harvesting sensitive data, including passwords, cookies, and autofill information from browsers such as Chrome and Firefox, as well as credentials and assets from cryptocurrency wallets including Electrum, Coinomi, and Exodus. The malware also searches Desktop, Documents, and Downloads folders for text, PDF, and DOCX files, and can capture session data from applications like Telegram Desktop and OpenVPN Connect.​

Recent analysis shows newer AMOS variants ship with an integrated backdoor that gives attackers persistent, remote access to infected Macs even after reboots. Cybersecurity firm Moonlock notes this marks only the second globally scaled macOS backdoor operation after previous campaigns linked to North Korean groups, and warns that AMOS has already been detected in attacks across more than 120 countries, with the United States, France, Italy, the United Kingdom, and Canada among the most affected.​

Global campaigns and blocked attacks

Threat intelligence reports describe AMOS as one of the most widespread macOS stealers currently in circulation, offered under a malware as a service model to different criminal crews. These groups combine techniques such as malvertising, fake support pages, and now shared AI chats to lure victims into running single line installation commands that bypass normal user skepticism and native security prompts.​

CrowdStrike recently disclosed that its Falcon platform blocked more than 300 attempted intrusions between June and August 2025 involving SHAMOS, a variant of Atomic macOS Stealer developed by the cybercrime group Cookie Spider. Those campaigns relied heavily on fraudulent macOS help sites promoted via online advertising, illustrating how commercial off the shelf stealers like AMOS are being repeatedly repurposed and redistributed through evolving social engineering vectors.​

Mitigation advice for macos users

Security specialists stress that users should never execute Terminal commands copied from unverified chats, search results, or online guides, regardless of whether the content is hosted on a trusted domain. Experts recommend checking any unfamiliar one line command with IT teams or by using independent analysis tools, and verifying software downloads through official vendor websites rather than search ads or intermediaries.​

Defenders advise macOS users, including professionals managing sensitive data or cryptocurrency assets, to run reputable endpoint protection capable of detecting AMOS and similar stealers, to keep systems and browsers updated, and to monitor for unusual access to accounts and wallets. Organizations are also encouraged to train staff about ClickFix style tactics that disguise malicious commands as harmless fixes or productivity enhancements.​


  • Fajr
  • Sunrise
  • Dhuhr
  • Asr
  • Maghrib
  • Isha

Read more

This website, walaw.press, uses cookies to provide you with a good browsing experience and to continuously improve our services. By continuing to browse this site, you agree to the use of these cookies.