Malvertising Mayhem: COOKIE SPIDER’s Sneaky SHAMOS Attack on macOS Users
COOKIE SPIDER’s SHAMOS malware hits over 300 environments through sneaky malvertising. MacOS users searching for tech fixes were duped into running a command that bypassed security checks. Remember, if a website’s fix looks too good to be true, it probably comes with a side of malware!

Hot Take:
Who knew that a simple “flush resolver cache” search could flush your crypto wallet down the drain? COOKIE SPIDER is not just a mouthful, but apparently a walletful of stolen credentials and crypto. macOS users, it’s time to stop thinking of your system as the Fort Knox of operating systems and start treating it like a pet that needs constant attention and the occasional flea bath. Keep your guard up, or your digital cookies might just crumble.
Key Points:
– COOKIE SPIDER used malvertising to spread SHAMOS, a new AMOS malware variant.
– 300+ environments across multiple countries were targeted.
– The attack bypassed macOS Gatekeeper using a one-line command.
– SHAMOS steals credentials, crypto wallets, and more.
– Fake help sites and GitHub repositories were key in the operation.