← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
macOS ClickFix Campaign: AppleScript Stealers & New Terminal Protections
A sophisticated ClickFix campaign targets both Windows and macOS users through fake CAPTCHA pages that trick victims into executing malicious commands. The macOS variant deploys an AppleScript-based infostealer that harvests sensitive data including keychain databases, credentials, and session cookies from 12 browsers, over 200 browser extensions, and 16 cryptocurrency wallets. The malware employs a persistent, non-closable dialog box mimicking legitimate system prompts to force victims into providing their system password. Stolen session cookies enable attackers to bypass multi-factor authentication by hijacking active sessions. The campaign uses client-side JavaScript to filter victims by user-agent, directing desktop users to OS-specific payloads while ignoring mobile devices. Latest macOS updates include native terminal security warnings designed to alert users against pasting potentially malicious commands.
MITRE ATT&CK & Malware Families
Indicators of Compromise (11)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| IPv4 | 172.94.9.250 | — | 2026-04-21 | |
| FileHash-MD5 | e12285f507c847b986233991b86b22e3 | — | 2026-04-21 | |
| hostname | gen.detect.by.nscloudsandbox.tr | — | 2026-04-21 | |
| IPv4 | 172.94.9.250 | CC=DE ASN=AS3223 voxility llp | 2026-04-21 | |
| URL | https://bull-run.fun/ | — | 2026-04-21 | |
| URL | https://spot-wave.fun/ | — | 2026-04-21 | |
| FileHash-SHA256 | 77b1beb083e4e2074402742ef2d677835072acf0e7ddd9ee8206e5a2c76b1ca5 | — | 2026-04-21 | |
| FileHash-SHA256 | c07a15640065580e3bbff86eb567050e1a9e9847e2034ff00953ce7eeb2eec41 | — | 2026-04-21 | |
| URL | http://172.94.9.250/d/xxx10108 | — | 2026-04-21 | |
| domain | bull-run.fun | — | 2026-04-21 | |
| domain | spot-wave.fun | — | 2026-04-21 |