Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto

By Published On: December 12, 2025

 

The digital landscape is a constant battleground, and threat actors continually refine their tactics. A distressing new campaign has emerged, demonstrating sophisticated ingenuity: hackers are now exploiting legitimate AI platforms to deliver malicious payloads, specifically targeting macOS users. This isn’t just about phishing links; it’s about weaponizing trust in AI to compromise your sensitive data, including passwords and cryptocurrency.

The Devious New Tactic: Weaponizing LLM Shared Chats

Recent intelligence reveals a concerning trend where malicious actors are leveraging the perceived legitimacy of large language model (LLM) shared chats. The attack vector begins subtly, preying on users performing common troubleshooting searches. For instance, individuals searching for “how to clear storage on Mac” might encounter sponsored Google search results that appear legitimate but redirect to fraudulent AI platform interfaces.

These fake ChatGPT and DeepSeek shared chat links are the core of the attack. Instead of providing helpful troubleshooting steps, these seemingly innocuous chat transcripts contain cleverly disguised malicious code. When unsuspecting users copy and paste these “solutions” into their terminal or execute them, they inadvertently trigger the download and installation of malware designed to exfiltrate critical information.

Understanding the Attack Chain

The sophistication of this campaign lies in its multi-stage approach, which capitalizes on user trust in both search engines and AI:

  • Sponsored Search Ad Compromise: Threat actors purchase sponsored ad slots on Google for popular macOS troubleshooting queries. These ads appear high in search rankings, increasing their visibility and perceived credibility.
  • Redirection to Malicious LLM Copies: Clicking these sponsored ads leads users to meticulously crafted, yet fake, interfaces of popular LLMs like ChatGPT or DeepSeek. These interfaces are designed to look identical to the real ones, complete with mock shared chat conversations.
  • Malicious Code Injection: Within these fake shared chats, the “solutions” provided for the user’s query are not helpful commands but rather malicious scripts. These scripts are often disguised as legitimate system commands or software installations.
  • Payload Delivery and Execution: When a user copies and pastes these commands into their macOS terminal and executes them, the malicious script downloads and installs malware. This malware then targets sensitive user data.

The Primary Targets: Passwords and Cryptocurrency Wallets

The ultimate goal of this particular campaign is data exfiltration. The malware deployed is specifically designed to harvest:

  • User Passwords: This includes credentials stored in browsers, password managers, and system keychains.
  • Cryptocurrency Wallet Details: Access to crypto wallets, seeds, and private keys can lead to significant financial loss.

The ease with which these assets can be compromised through seemingly legitimate AI interactions underscores the evolving threat landscape for both individuals and organizations.

Remediation Actions and Proactive Defense

Protecting against these advanced social engineering and malware campaigns requires a multi-layered approach. Here are critical remediation actions:

  • Verify Search Results with Caution: Always scrutinize sponsored search results. Prioritize official documentation and well-known, reputable sources for technical support.
  • Authenticate LLM Platforms: Before interacting with any AI chat interface, ensure you are on the legitimate domain. Bookmark official sites and avoid clicking through unverified links.
  • Exercise Extreme Caution with Copied Code: Never copy and paste commands from untrusted sources directly into your terminal. Even if the source appears credible, always understand what a command does before executing it.
  • Implement Endpoint Detection and Response (EDR): EDR solutions can help detect unusual activity, such as unauthorized script execution or attempts to exfiltrate data, on macOS endpoints.
  • Use a Robust Antivirus/Anti-Malware Solution: Ensure your macOS device is protected by up-to-date security software capable of detecting and blocking known malware strains.
  • Enable Multi-Factor Authentication (MFA): MFA significantly reduces the risk of account compromise, even if your password is stolen.
  • Regularly Back Up Your Data: In the event of a successful compromise, having recent backups can mitigate data loss.
  • Monitor Cryptocurrency Wallet Activity: Regularly review transactions and balances for any suspicious activity. Consider hardware wallets for significant crypto holdings.

Detection and Analysis Tools

For IT professionals and security analysts, several tools can aid in detection, analysis, and mitigation of such threats:

Tool Name Purpose Link
Virustotal File and URL analysis for malware; community-driven reports. https://www.virustotal.com/
Process Monitor (Sysinternals) Advanced monitoring tool for Windows, but concept applies to macOS for process analysis. https://learn.microsoft.com/en-us/sysinternals/downloads/procmon
Wireshark Network protocol analyzer for deep packet inspection and detecting suspicious network traffic. https://www.wireshark.org/
OpenSnitch (macOS equivalent) Application firewall similar to Little Snitch, can monitor and control outbound network connections. https://github.com/Evilsocket/opensnitch
YARA Rules Pattern matching tool used by malware researchers to identify and classify malware samples. https://virustotal.github.io/yara/

Key Takeaways

The evolving threat of hackers exploiting LLM shared chats underscores a critical shift in attack methodologies. By weaponizing trust in AI platforms and leveraging sophisticated social engineering, threat actors are finding new avenues to compromise macOS users’ sensitive data, including passwords and cryptocurrency. Vigilance, critical evaluation of online sources, and robust security practices are no longer optional but essential for safeguarding digital assets in this increasingly complex threat landscape.

 

Share this article

Leave A Comment