更多来自谷歌搜索的Mac恶意软件
More Mac malware from Google search

原始链接: https://eclecticlight.co/2026/01/30/more-malware-from-google-search/

谷歌的AI再次显示指向恶意软件的链接,特别是针对Mac的AMOS(SOMA)窃取程序。最新的活动利用伪造的类似苹果的网站和在Medium等平台上的被入侵文章,在谷歌搜索结果中显著显示——甚至以赞助内容的形式出现。 攻击诱骗用户将恶意命令粘贴到终端中,伪装成有用的解决方案(例如清除缓存)。一旦执行,AMOS窃取程序会复制文档、窃取密码(包括以明文形式存储)、并尝试访问备忘录。值得注意的是,即使在虚拟化环境中,该恶意软件也能运行。 核心问题不是macOS安全性的缺陷,而是用户被欺骗绕过内置保护。作者强调批判性思维:不要信任搜索结果,验证网站的真实性,展开缩短的链接,并且*绝不*盲目执行来自未知来源的命令——尤其是那些使用base-64等工具混淆或使用`curl`的命令。警惕性和理解命令*作用*至关重要,可以避免这种类型的攻击。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 更多 Google 搜索中发现更多 Mac 恶意软件 (eclecticlight.co) 19 分,由 kristianp 1 小时前发布 | 隐藏 | 过去 | 收藏 | 2 条评论 ProtectorFox 11 分钟前 | 下一个 [–] GitHub 也有 https://iboostup.com/blog/ai-fake-repositories-github 回复 retired 14 分钟前 | 上一个 [–] 感谢提醒我关闭终端的完全磁盘访问权限。我不确定我为什么开启了它。 回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

Little more than a month after I reported that Google’s AI was offering links to malicious scripts, that is happening again, with a slight twist. I’m grateful to Olena of Clario for informing me that there’s a new campaign in progress to deliver AMOS (alias SOMA) stealers to Macs. You can read Vladyslav Kolchin’s account of this in his blog post.

Vladyslav has discovered these in forged Apple-like sites linked from docs.google.com and business.google.com, as well as in articles posted on Medium. I had success in finding the last of those, which appeared at the top of Google’s sponsored results when searching for how to clear cache on macos tahoe.

That took me to Clear Mareks’ stories in medium.com, where there’s the familiar ploy to get us to paste a malicious command into Terminal. On another occasion, you might be presented with a page claiming to be official Apple Support, although it obviously isn’t.

This is almost identical to the previous attack via ChatGPT, and even the base-64 obfuscation is very similar.

This downloaded and ran an AMOS stealer, which unusually didn’t seem too bothered about being run in a locked-down virtual machine.

It immediately started copying the contents of my Documents folder to “FileGrabber”, and wrote several hidden files to the top level of my Home folder, including:

  • .agent, an AppleScript to run the theft
  • .mainHelper, the main Mach-O binary
  • .pass, my password in plain text.

Those appear the same as the version of AMOS delivered using last year’s ChatGPT deception. In addition to seeking access to the Documents folder, the malware asked for access to Notes.

The messages are the same. First, distrust everything you see in search engines. Assess what they return critically, particularly anything that’s promoted. It’s promoted for a reason, and that’s money, so before you click on any link ask how that’s trying to make money from you.

Next, check the provenance and authenticity of where that click takes you. In this case, it was to a Medium article that had been poisoned to trick you. When you’re looking for advice, look for a URL that’s part of a site you recognise as a reputable Mac specialist. Never follow a shortened link without expanding it using a utility like Link Unshortener from the App Store, rather than one of the potentially malicious sites that claims to perform that service.

When you think you’ve found a solution, don’t follow it blindly, be critical. Never run any command in Terminal unless it comes from a reputable source that explains it fully, and you have satisfied yourself that you understand exactly what it does. In this case the command provided was obfuscated to hide its true action, and should have rung alarm bells as soon as you saw it.

If you were to spare a few moments to read what it contains, you would have seen the command curl, which is commonly used by malware to fetch their payloads without any quarantine xattr being attached to them. Even though the rest of the script had been concealed by base-64 encoding, that shouts out that this is malicious.

Why can’t macOS protect you from this? Because at each step you have been tricked into bypassing its protections. Terminal isn’t intended to be a place for the innocent to paste obfuscated commands inviting you to surrender your password and download executable code to exploit your Mac. curl isn’t intended to allow malware to arrive without being put into quarantine. And ad hoc signatures aren’t intended to allow that malicious code to be executed.

Maybe it’s appropriate that Marek’s disease is chicken herpes.

联系我们 contact @ memedata.com