Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

Fake Homebrew ClickFix Campaign Delivering Cuckoo Stealer on macOS

Amber | Attack Report
Download PDF

Summary

A sophisticated social engineering campaign leverages the ClickFix technique to deliver Cuckoo Stealer, a full-featured macOS infostealer and remote access trojan, through typosquatted Homebrew installation pages targeting macOS developers worldwide. Attackers created high-fidelity clones of the legitimate Homebrew website (brew.sh) across multiple typosquatted domains hosted on shared infrastructure, deceiving macOS developers into executing modified curl commands that download credential-harvesting loaders followed by second-stage Cuckoo Stealer infostealer binaries. This Homebrew ClickFix campaign targets software development, technology, and cryptocurrency industries globally while excluding CIS countries, exploiting developer trust in the widely-used Homebrew package manager. The Cuckoo Stealer malware deployed through fake Homebrew sites is capable of exfiltrating browser credentials, cryptocurrency wallets, macOS Keychain data, messaging application sessions including Discord and Telegram, and financial data from over twenty cryptocurrency applications. The fake Homebrew campaign first observed on January 13, 2026, funnels macOS victims to typosquatted Homebrew domains through search engine poisoning, malicious advertisements, and deceptive look-alike URLs that deliver Cuckoo Stealer malware disguised as legitimate Homebrew installation scripts.

Attack Details

Fake Homebrew Website Impersonation and ClickFix Social Engineering

A social engineering campaign targets macOS users by impersonating the official Homebrew package manager website and weaponizing developer trust in this essential macOS tool. Victims are funneled to typosquatted Homebrew domains through search engine poisoning, malicious advertisements, and deceptive look-alike URLs mimicking the legitimate brew.sh domain. Threat actors built near pixel-perfect clones of the legitimate Homebrew site, carefully replicating its branding, layout, and multilingual functionality to deceive macOS developers. The fake Homebrew deception hinges on subtle modification within the installation command displayed on typosquatted sites: instead of pulling from the legitimate raw.githubusercontent.com domain, the malicious Homebrew script references raw.homabrews[.]org, a minor alteration easily evading casual inspection by macOS developers. A JavaScript-powered “Copy” button on fake Homebrew sites silently places the malicious curl command into the user’s clipboard, exploiting the common developer workflow of pasting Homebrew installation commands directly into Terminal.

Trojanized Homebrew Installer and Cuckoo Stealer First-Stage Deployment

Once the fake Homebrew command is executed, the tampered curl retrieves a trojanized installer script from attacker-controlled infrastructure. Malicious logic is injected into what appears to be the standard Homebrew installation routine targeting macOS systems. The first-stage Cuckoo Stealer payload focuses on credential harvesting, repeatedly prompting macOS users for their system passwords. The fake Homebrew script leverages the native macOS dscl utility with the authonly argument to validate credentials without creating login sessions or generating authentication logs, making Cuckoo Stealer credential theft difficult to detect. Failed credential attempts return convincing “Sorry, try again” messages mimicking normal sudo behavior on macOS. After obtaining valid macOS credentials, the fake Homebrew script downloads a secondary binary named brew_agent into /tmp, Base64-encodes the stolen password, and passes it as a parameter. This stage deploys full Cuckoo Stealer malware, which initializes command-and-control communications, generates unique session identifiers, collects macOS environment data, and removes the macOS quarantine attribute via xattr to suppress Gatekeeper warnings. Cuckoo Stealer also performs locale-based filtering to avoid macOS systems configured for CIS regions and uses custom XOR-based string obfuscation with rotating keys to evade static detection.

Cuckoo Stealer Persistence and Command-and-Control Infrastructure

To maintain persistence on compromised macOS systems, Cuckoo Stealer abuses the macOS LaunchAgent mechanism, registering itself as com.homebrew.brewupdater.plist to blend in as a legitimate Homebrew component. The Cuckoo Stealer binary is copied into hidden macOS directories such as .local-{session_id} under the name BrewUpdater. Cuckoo Stealer command-and-control traffic is encrypted over HTTPS using X25519 elliptic curve Diffie-Hellman key exchange, generating ephemeral key pairs to derive shared secrets for session encryption. The Cuckoo Stealer malware implements a compact RAT protocol supporting arbitrary shell execution on macOS, silent command execution, system reboot, self-destruct routines with LaunchAgent cleanup, and granular exfiltration controls. Cuckoo Stealer commands are transmitted as single-byte identifiers within pipe-delimited beacon structures and encrypted using XOR keys derived from MD5 hashes for macOS C2 communications.

Cuckoo Stealer Comprehensive Data Exfiltration Capabilities

Cuckoo Stealer’s data exfiltration capabilities are extensive and financially motivated, targeting macOS users in software development and cryptocurrency industries. The malware silently captures screenshots using the macOS screencapture -x utility and establishes secondary socket channels for interactive file browsing on compromised macOS systems. Before sensitive activity, Cuckoo Stealer mutes system audio via AppleScript to reduce user awareness during exfiltration. Browser credential theft targets Chromium-based browsers on macOS, extracting cookies, saved logins, autofill records, browsing history, bookmarks, and installed extensions, particularly cryptocurrency wallet extensions including Coinbase Wallet, Phantom, Binance Wallet, and Rabby. Cuckoo Stealer also exfiltrates the macOS Keychain directory, Apple Notes databases, Discord tokens, Telegram session data, FileZilla credentials, OpenVPN profiles, Steam session files, and wallet data from over twenty cryptocurrency applications including node wallets for Bitcoin, Litecoin, Dogecoin, Raven, and DashCore, demonstrating deliberate focus on harvesting high-value financial assets from macOS developers at scale.

Recommendations

Verify Homebrew Installation Sources and Bookmark Legitimate Site

macOS users must always verify the legitimacy of Homebrew installation commands by confirming the source URL before executing any curl-based installation command in Terminal. Bookmark the legitimate brew.sh website to avoid reliance on search engine results that may be poisoned with fake Homebrew typosquatted domains. Only execute Homebrew installation commands from the verified official brew.sh domain.

Block Known Fake Homebrew Malicious Infrastructure

Organizations must immediately block identified malicious Homebrew typosquatted domains (homabrews[.]org, brewsh[.]cx, brrewsh[.]org, brewshh[.]org, brewmacos[.]com) and IP address 5.255.123[.]244 at DNS, proxy, and firewall levels across all organizational macOS endpoints to prevent Cuckoo Stealer infections from fake Homebrew campaigns.

Audit macOS LaunchAgents for Cuckoo Stealer Persistence

Security teams must review all LaunchAgent plists in ~/Library/LaunchAgents/ on macOS systems for suspicious entries, specifically checking for com.homebrew.brewupdater.plist or any plist referencing binaries in hidden directories matching the pattern “.local-” within user home directories, indicating potential Cuckoo Stealer persistence from fake Homebrew compromise.

Deploy Detection Rules for macOS Credential Harvesting

Organizations should create detection rules for macOS processes invoking the dscl command with the authonly verb outside expected authentication workflows, as this indicates potential credential harvesting activity consistent with Cuckoo Stealer’s first-stage payload deployed through fake Homebrew campaigns.

Enforce Browser Extension Whitelisting for Cryptocurrency Wallets

Implement browser extension whitelisting policies to protect cryptocurrency wallet extensions (Coinbase Wallet, Phantom Wallet, Binance Wallet, Rabby Wallet) on macOS from unauthorized Local Storage and IndexedDB access by malicious processes like Cuckoo Stealer deployed through fake Homebrew social engineering.

Rotate Credentials on Suspected Cuckoo Stealer Compromised macOS Systems

If evidence of Cuckoo Stealer compromise from fake Homebrew campaigns is found, immediately rotate all credentials stored in macOS Keychain, browser password managers, FTP clients (FileZilla), VPN configurations (OpenVPN), and messaging application sessions (Discord, Telegram), as Cuckoo Stealer targets all of these credential stores on compromised macOS systems.

Implement DNS Monitoring for Typosquatted Developer Tool Domains

Deploy DNS monitoring solutions capable of detecting typosquatting patterns targeting commonly used developer tools and package managers like Homebrew, with automated alerting for domains closely resembling legitimate software distribution infrastructure used by macOS developers.

MITRE ATT&CK TTPs

Resource Development (TA0042)
  • T1583: Acquire Infrastructure – Acquisition of fake Homebrew domains
  • T1583.001: Domains – Typosquatted Homebrew domain registration
  • T1608: Stage Capabilities – Staging malicious Homebrew installation scripts
  • T1608.005: Link Target – Malicious Homebrew download links
Initial Access (TA0001)
  • T1566: Phishing – Fake Homebrew social engineering
  • T1566.002: Spearphishing Link – Links to typosquatted Homebrew sites
  • T1189: Drive-by Compromise – Malicious advertisement redirects to fake Homebrew
Execution (TA0002)
  • T1204: User Execution – User executing malicious Homebrew commands
  • T1204.002: Malicious File – Execution of Cuckoo Stealer binary
  • T1204.004: Malicious Copy and Paste – ClickFix clipboard exploitation
  • T1204.001: Malicious Link – Following fake Homebrew links
  • T1059: Command and Scripting Interpreter – Shell and script execution
  • T1059.004: Unix Shell – macOS Terminal command execution
  • T1059.002: AppleScript – AppleScript for audio muting
Persistence (TA0003)
  • T1543: Create or Modify System Process – macOS LaunchAgent creation
  • T1543.001: Launch Agent – com.homebrew.brewupdater.plist persistence
  • T1547: Boot or Logon Autostart Execution – macOS autostart mechanisms
Defense Evasion (TA0005)
  • T1562: Impair Defenses – Disabling macOS security features
  • T1562.001: Disable or Modify Tools – Suppressing Gatekeeper warnings
  • T1036: Masquerading – Masquerading as legitimate Homebrew components
  • T1036.005: Match Legitimate Name or Location – Homebrew naming conventions
  • T1027: Obfuscated Files or Information – XOR string obfuscation
  • T1027.013: Encrypted/Encoded File – Base64 encoding
  • T1553: Subvert Trust Controls – Bypassing macOS security controls
  • T1553.001: Gatekeeper Bypass – Removing quarantine attributes
  • T1070: Indicator Removal – Cleanup of Cuckoo Stealer artifacts
  • T1070.004: File Deletion – Self-destruct functionality
  • T1656: Impersonation – Impersonating Homebrew website
Discovery (TA0007)
  • T1614: System Location Discovery – macOS locale detection
  • T1614.001: System Language Discovery – Language-based filtering
  • T1082: System Information Discovery – macOS environment enumeration
  • T1083: File and Directory Discovery – File system reconnaissance
  • T1518: Software Discovery – Installed application discovery
Credential Access (TA0006)
  • T1056: Input Capture – Credential prompt interception
  • T1056.002: GUI Input Capture – macOS password prompts
  • T1552: Unsecured Credentials – Credential file harvesting
  • T1552.001: Credentials In Files – File-based credential theft
  • T1555: Credentials from Password Stores – macOS credential stores
  • T1555.001: Keychain – macOS Keychain exfiltration
  • T1555.003: Credentials from Web Browsers – Browser credential theft
  • T1539: Steal Web Session Cookie – Cookie theft from browsers
Collection (TA0009)
  • T1113: Screen Capture – Screenshot capture on macOS
  • T1005: Data from Local System – Local macOS data collection
  • T1119: Automated Collection – Automated Cuckoo Stealer exfiltration
  • T1560: Archive Collected Data – Data archiving for exfiltration
Command and Control (TA0011)
  • T1071: Application Layer Protocol – HTTPS C2 communications
  • T1071.001: Web Protocols – HTTP/HTTPS for Cuckoo Stealer C2
  • T1573: Encrypted Channel – Encrypted Cuckoo Stealer communications
  • T1573.002: Asymmetric Cryptography – X25519 key exchange
  • T1573.001: Symmetric Cryptography – Session encryption
  • T1105: Ingress Tool Transfer – Downloading Cuckoo Stealer components
Exfiltration (TA0010)
  • T1041: Exfiltration Over C2 Channel – Data exfiltration via Cuckoo Stealer C2
Impact (TA0040)
  • T1529: System Shutdown/Reboot – macOS system reboot capability

Indicators of Compromise (IOCs)

SHA256 Hashes Associated with Cuckoo Stealer
  • f985cd667c77e7d99c1ac2ea9cb0861ded15e1c2d44e480cbd178ca8b2caae42
  • 545dd5cba264bf242bc837330ca34247e202f7ac25f03eec63bf5842357519f1
Cuckoo Stealer File Paths on macOS
  • ~/Library/LaunchAgents/com.homebrew.brewupdater.plist
  • ~/.local-{session_id}/BrewUpdater
Fake Homebrew Typosquatted Domains

homabrews[.]org, raw[.]brewsh[.]cx, braw[.]sh, brewsh[.]cx, brew[.]lat, brew[.]pages[.]dev, brrewsh[.]org, brewmacos[.]com

IP Address Associated with Fake Homebrew Infrastructure
  • 5[.]255[.]123[.]244

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox