PULSE NAME
macOS ClickFix Campaign: AppleScript Stealers & New Terminal Protections
WHITE AlienVault 2026-04-21 Modified: 2026-04-21
11
IOCs
MEDIUM VOLUME
A sophisticated ClickFix campaign targets both Windows and macOS users through fake CAPTCHA pages that trick victims into executing malicious commands. The macOS variant deploys an AppleScript-based infostealer that harvests sensitive data including keychain databases, credentials, and session cookies from 12 browsers, over 200 browser extensions, and 16 cryptocurrency wallets. The malware employs a persistent, non-closable dialog box mimicking legitimate system prompts to force victims into providing their system password. Stolen session cookies enable attackers to bypass multi-factor authentication by hijacking active sessions. The campaign uses client-side JavaScript to filter victims by user-agent, directing desktop users to OS-specific payloads while ignoring mobile devices. Latest macOS updates include native terminal security warnings designed to alert users against pasting potentially malicious commands.
Indicators of Compromise (11)
All IPv4 FileHash-MD5 hostname URL FileHash-SHA256 domain
TYPEINDICATORDESCRIPTIONCREATED
IPv4 172.94.9.250 2026-04-21
FileHash-MD5 e12285f507c847b986233991b86b22e3 2026-04-21
hostname gen.detect.by.nscloudsandbox.tr 2026-04-21
IPv4 172.94.9.250 CC=DE ASN=AS3223 voxility llp 2026-04-21
URL https://bull-run.fun/ 2026-04-21
URL https://spot-wave.fun/ 2026-04-21
FileHash-SHA256 77b1beb083e4e2074402742ef2d677835072acf0e7ddd9ee8206e5a2c76b1ca5 2026-04-21
FileHash-SHA256 c07a15640065580e3bbff86eb567050e1a9e9847e2034ff00953ce7eeb2eec41 2026-04-21
URL http://172.94.9.250/d/xxx10108 2026-04-21
domain bull-run.fun 2026-04-21
domain spot-wave.fun 2026-04-21