SHAMOS Strikes: Malvertising Madness Hits macOS Users Worldwide

A malvertising campaign targeting hundreds of organizations aimed to deploy the SHAMOS variant of the Atomic macOS Stealer. Victims were lured to fake macOS help sites and tricked into executing a malicious one-line installation command. CrowdStrike blocked attempts to compromise over 300 environments, highlighting the popularity of these tricks among eCrime actors.

Pro Dashboard

Hot Take:

Well, well, well, it seems that cookies aren’t just for browsers anymore. Meet Cookie Spider, the cyber-bakery that’s been whipping up a fresh batch of trouble for macOS users. They’ve taken the “one-liner” to a new level, but instead of a punchline, you get a punch to your security. Who knew that getting caught in a web could lead to such a crumby situation?

Key Points:

– Between June and August 2025, a malvertising campaign targeted macOS users with a variant of the Atomic macOS Stealer (AMOS).
– The campaign used fraudulent macOS help websites to trick users into executing a malicious one-line installation command.
– Cookie Spider, a malware-as-a-service group, developed the SHAMOS variant of the AMOS infostealer.
– CrowdStrike blocked the campaign from compromising over 300 customer environments.
– The malvertising sites appeared in search results globally, except in Russia, due to eCrime forum restrictions.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?