New SHAMOS Stealer Exploits One-Line Commands on macOS
Summary
A new cyber attack campaign targeting macOS users has emerged, leveraging SHAMOS, a variant of the Atomic macOS Stealer (AMOS). The threat actor Cookie Spider has been actively exploiting victims worldwide (except Russia) since June 2025. Using malvertising and fake support websites, users were tricked into executing one-line terminal commands that secretly downloaded SHAMOS. The malware bypassed Apple Gatekeeper, evaded detection, and exfiltrated sensitive data including credentials, Keychain entries, browser cookies, and cryptocurrency wallets. In certain cases, SHAMOS also installed additional payloads disguised as legitimate apps, highlighting the growing sophistication of macOS-targeted threats.
Attack Details
Between June and August 2025, Cookie Spider deployed SHAMOS through fraudulent troubleshooting sites. Victims searching for macOS help were redirected to fake support portals prompting them to run suspicious terminal one-liners.
Once installed, SHAMOS executed advanced evasion tactics:
Anti-VM checks to avoid sandboxes
Removal of Apple Gatekeeper attributes
Use of AppleScript for host reconnaissance
Its data theft operations focused on:
Browser and Keychain credentials
Notes and crypto wallets
Exfiltration via remote servers
Additionally, SHAMOS sometimes delivered secondary payloads disguised as trusted apps like Ledger Live.
The campaign’s global scale spanned the U.S., UK, Japan, China, Colombia, Canada, Mexico, and Italy. This reflects a scalable delivery model, proving that macOS users remain prime targets for credential theft and financial fraud.
Recommendations
To mitigate SHAMOS infections and strengthen macOS defenses:
Educate Users on Malvertising: Train employees to avoid suspicious ads, fake support pages, and one-liner terminal prompts.
Restrict Unsigned Scripts: Block or monitor scripts fetched with curl, wget, or obfuscated commands like Base64.
Strengthen Endpoint Monitoring: Detect behaviors linked to info-stealers such as unusual xattr use, unexpected AppleScript execution, or repeated Keychain access.
Monitor Data Exfiltration: Watch for abnormal traffic like repeated curl uploads or archive transfers to suspicious domains.
Enforce Least Privilege: Limit unnecessary admin rights to reduce persistence and malware installation impact.
Indicators of Compromise (IoCs)
SHA256 Hashes:
231c4bf14c4145be77aa4fef36c208891d818983c520ba067dda62d3bbf547f
eb7ede285aba687661ad13f22f8555aab186debbadf2c116251cb269e913ef68
4549e2599de3011973fde61052a55e5cdb770348876abc82de14c2d99575790f
b01c13969075974f555c8c88023f9abf891f72865ce07efbcee6c2d906d410d5
a4e47fd76dc8ed8e147ea81765edc32ed1e11cff27d138266e3770c7cf953322
95b97a5da68fcb73c98cd9311c56747545db5260122ddf6fae7b152d3d802877
Domains:
mac-safer[.]com
rescue-mac[.]com
URLs:
hxxps[:]//icloudservers[.]com/gm/install[.]sh
hxxps[:]//macostutorial[.]com/iterm2/install[.]sh
hxxps[:]//icloudservers[.]com/gm/update
hxxps[:]//macostutorial[.]com/iterm2/update
hxxps[:]//github[.]com/jeryrymoore/Iterm2
MITRE ATT&CK TTPs
Initial Access: TA0001 – Drive-by Compromise (T1189), User Execution (T1204)
Execution: TA0002 – AppleScript (T1059.002), Command Interpreter (T1059)
Defense Evasion: TA0005 – Obfuscated Files (T1027), Command Obfuscation (T1027.010)
Persistence: TA0003 – Ingress Tool Transfer (T1105)
Credential Access: TA0006 – Keychain Access (T1555, T1555.001)
Collection: TA0009 – Data from Local System (T1005)
Exfiltration: TA0010 – Exfiltration Over C2 (T1041)
References
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox