
New ClickFix Attacks as macOS Infostealer Leverages Official ChatGPT Website by Piggybacking
A disturbing new campaign is actively targeting macOS users, exploiting a seemingly innocuous feature of the official ChatGPT website. This sophisticated attack, dubbed “ClickFix,” weaponizes legitimate chat-sharing functionalities to deliver the notorious AMOS infostealer. Cybersecurity professionals and macOS users alike need to understand the mechanics of this threat to effectively defend against it.
Understanding the ClickFix Attack Vector
The ClickFix campaign distinguishes itself through its ingenious use of a trusted platform: chatgpt.com. Attackers are not compromising the ChatGPT website directly but rather leveraging its built-in features for malicious ends. Specifically, they exploit ChatGPT’s chat-sharing capability, which allows any user to create and publicly share a conversation transcript. This seemingly benign feature becomes a powerful distribution channel when malevolently employed.
The core of the attack lies in creating fake “installation guides” or “software download links” disguised within these shared ChatGPT conversations. Victims are lured to these pages, often through social engineering tactics, expecting to find legitimate software or instructions. Instead, they encounter deceptive content designed to trick them into downloading and executing the AMOS infostealer.
The Role of the AMOS Infostealer
The AMOS (Atomic macOS Stealer) infostealer is a significant threat to macOS users. Once successfully deployed, AMOS is designed to exfiltrate a wide array of sensitive data from compromised systems. This can include:
- Browser data (passwords, cookies, autofill information)
- Cryptocurrency wallet data
- System information
- Files from specific directories
- iCloud keychain information
- SSH keys
The exfiltration of this data poses a severe risk, leading to potential financial fraud, identity theft, and unauthorized access to personal and professional accounts. The fact that AMOS is delivered via a trusted domain like chatgpt.com significantly lowers a victim’s guard, increasing the likelihood of successful infection.
Deconstructing the Piggybacking Technique
The “piggybacking” aspect of this attack is crucial to its effectiveness. By hosting malicious content within a legitimate and widely trusted domain, attackers bypass many standard security checks. Users are generally trained to look for legitimate URLs and SSL certificates as indicators of trust. When they see chatgpt.com in their browser’s address bar, they are less likely to suspect malicious activity, even if the content within the page is suspicious. This sophisticated social engineering tactic exploits human trust in well-known brands.
Remediation Actions and Prevention
Protecting against ClickFix and similar infostealer campaigns requires a multi-layered approach, combining user awareness with robust security practices.
- Exercise Extreme Caution with Downloads: Always verify the source of any software download. If a download link is provided within a chat conversation, even on a legitimate-looking site, cross-reference it with the official vendor’s website. Never download software directly from an untrusted or unverified source.
- Verify Software Integrity: Before installing any software, especially on macOS, verify its integrity. Check for notarization, Gatekeeper warnings, and ideally, scan it with reputable antivirus software.
- Implement Browser Security Measures: Utilize browser extensions that enhance security, such as ad blockers and script blockers, which can sometimes interfere with malicious redirects or downloads. Keep your browser and its extensions updated.
- Endpoint Detection and Response (EDR): For organizations, deploy robust EDR solutions capable of detecting and responding to suspicious process activity and data exfiltration attempts unique to infostealers like AMOS.
- Regular Software Updates: Ensure your macOS operating system and all applications are kept up-to-date. Security patches often address vulnerabilities that could be exploited by malware.
- Strong, Unique Passwords and MFA: Use strong, unique passwords for all accounts and enable multi-factor authentication (MFA) wherever possible. This provides an additional layer of security even if credentials are compromised.
- User Awareness Training: Educate users about the dangers of social engineering, phishing, and the importance of verifying download sources, even from seemingly legitimate websites.
CVE Information and Relevant Tools
While the ClickFix campaign primarily leverages social engineering and platform abuse rather than a specific software vulnerability with an assigned CVE, the AMOS infostealer it deploys may exploit underlying system vulnerabilities or leverage common attack techniques. There isn’t a direct CVE for “ClickFix” as it describes an attack methodology. However, understanding the tools that can detect or mitigate such threats is critical.
| Tool Name | Purpose | Link |
|---|---|---|
| Malwarebytes for Mac | Detects and removes macOS malware, including infostealers. | https://www.malwarebytes.com/mac |
| Objective-See Tools | Suite of macOS security tools (e.g., BlockBlock, LuLu, RansomWhere?) for monitoring and prevention. | https://objective-see.com/products.html |
| Virustotal | Online service for analyzing suspicious files and URLs for malware. | https://www.virustotal.com/ |
| Little Snitch | Network monitor and firewall for macOS, helps identify unauthorized network connections. | https://www.obdev.at/products/littlesnitch/index.html |
Conclusion
The ClickFix campaign is a stark reminder that cyber threats are constantly evolving, exploiting not just technical vulnerabilities but also human trust and the very features designed for convenience. The use of chatgpt.com to spread the AMOS infostealer highlights the sophistication of modern attackers. Vigilance, critical evaluation of online content, and robust security practices are paramount for safeguarding macOS systems against these emerging and insidious threats.


