
Hackers Use ClickFix and Malicious DMG Files to Deliver notnullOSX on macOS
A sophisticated new threat has emerged targeting macOS users, particularly those with significant cryptocurrency holdings. Researchers have identified notnullOSX, an info-stealer designed to silently compromise Apple systems, operating through meticulously crafted social engineering and malicious file distribution. This highly targeted malware underscores the persistent evolution of cyber threats against Apple’s ecosystem.
Understanding notnullOSX: A Go-Based macOS Info-Stealer
notnullOSX is a novel macOS infostealer written in Go, a programming language increasingly favored by malware developers for its cross-platform capabilities and ease of deployment. Unlike many broad-stroke campaigns, notnullOSX operates with precision, with its operators reportedly hand-picking victims through an affiliate panel. Its primary target? Cryptocurrency holders, specifically those with wallet balances exceeding $10,000, indicating a clear financial motivation for its creators.
Two Parallel Attack Vectors: ClickFix and Malicious DMG Files
The ingenuity of the notnullOSX campaign lies in its dual-pronged delivery mechanism, combining social engineering with technical obfuscation:
- ClickFix Social Engineering: This method typically involves deceptive tactics to trick users into executing malicious code or downloading harmful files. While specific details of the ClickFix implementation for notnullOSX are still emerging, it likely leverages phishing, baiting, or pre-texting to gain initial user interaction, often masquerading as legitimate software updates, support tools, or essential utilities.
- Malicious DMG Disk Image Files: Disk Image (DMG) files are common on macOS for software distribution. Attackers weaponize these by embedding malicious payloads within seemingly benign application installers. When a user mounts and opens such a DMG, installing the “application” inadvertently deploys notnullOSX. These DMGs are often distributed via compromised websites, malicious advertisements, or through the aforementioned social engineering lures.
Both methods aim to bypass macOS’s native security features, relying on user interaction or exploiting trust to establish a foothold on the target system. The silent nature of the compromise means victims may be unaware their systems have been breached until significant data loss or financial impact occurs.
Targeted Operations: The Crypto Connection
The focus on high-value cryptocurrency holders highlights a concerning trend in cybercrime. Targeting individuals with over $10,000 in crypto assets suggests a high return on investment for the attackers, leading to more sophisticated and persistent campaigns. notnullOSX is designed to exfiltrate sensitive financial information, potentially including private keys, wallet seed phrases, and exchange credentials, enabling attackers to drain digital assets rapidly.
Remediation Actions for macOS Users
Given the targeted nature and sophisticated delivery of notnullOSX, robust defenses and proactive measures are essential for macOS users, particularly cryptocurrency investors:
- Exercise Extreme Caution with Downloads: Only download software from official developer websites or the Apple App Store. Be highly suspicious of any unsolicited software, updates, or DMG files from untrusted sources.
- Verify Digital Signatures: Before running any application, especially those downloaded outside the App Store, verify its developer signature. macOS Gatekeeper often performs this check, but users should be aware of warnings. Apps with unsigned or revoked developer certificates should never be run.
- Keep macOS Updated: Regularly install macOS security updates. Apple frequently patches vulnerabilities (e.g., CVE-2023-38604, relevant to some Gatekeeper bypasses), and keeping your system current is a fundamental defense.
- Use Reputable Antivirus/Endpoint Detection and Response (EDR): Implement third-party security software specifically designed for macOS. These tools can often detect and block known malware signatures and suspicious behaviors that native protections might miss.
- Multi-Factor Authentication (MFA): Enable MFA on all cryptocurrency exchanges, wallets, and sensitive online accounts. Even if credentials are stolen, MFA can prevent unauthorized access.
- Hardware Wallets: For substantial cryptocurrency holdings, consider using a hardware wallet. These devices store private keys offline, making them significantly more resistant to software-based theft.
- Regular Backups: Maintain regular, encrypted backups of critical data, including cryptocurrency wallet files, to an offline storage medium.
- Scrutinize Social Engineering Attempts: Be wary of unexpected messages, emails, or pop-ups asking for personal information, directing you to download files, or purporting to be from technical support needing remote access.
Detection & Analysis Tools for notnullOSX
Security professionals and advanced users can leverage various tools for detecting and analyzing potential notnullOSX infections:
| Tool Name | Purpose | Link |
|---|---|---|
| Yara Rules | Signature-based detection of notnullOSX binaries and associated artifacts. | https://github.com/Yara-Rules/rules |
| VirusTotal | Upload suspicious files for analysis by multiple antivirus engines and threat intelligence. | https://www.virustotal.com/ |
| Objective-See Tools | Suite of macOS security tools (e.g., LuLu, BlockBlock, TaskExplorer) for monitoring and detection. | https://objective-see.com/products.html |
| Packet Capture (e.g., Wireshark) | Monitor network traffic for suspicious connections or data exfiltration attempts. | https://www.wireshark.org/ |
Conclusion
The emergence of notnullOSX, leveraging the ClickFix technique and malicious DMG files, serves as a stark reminder of the evolving threats targeting macOS. Its highly targeted nature and focus on cryptocurrency holders necessitate heightened vigilance from all Apple users, especially those with significant digital assets. Adhering to fundamental cybersecurity best practices, coupled with a healthy skepticism towards unsolicited software and communications, remains the most effective defense against sophisticated info-stealers like notnullOSX.


