Claude LLM Artifacts Abused to Deliver Mac Infostealer Malware in ClickFix Campaign

Related

Windows 11 Security Update KB5077181 Triggers Boot Failures and System Instability

What happened Microsoft’s February 10, 2026 Patch Tuesday security update...

Google Links Suspected Russian Actor to CANFAIL Malware Targeting Ukrainian Organizations

What happened Google’s Threat Intelligence Group (GTIG) has publicly attributed...

Share

What happened

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver infostealer malware to macOS users through ClickFix campaigns. According to researchers at Moonlock Lab and AdGuard, attackers promoted malicious search results that directed users to Claude-generated guides or fake support pages instructing them to run Terminal commands.  These commands downloaded and executed a loader for the MacSync infostealer, which steals sensitive data including keychain contents, browser credentials, and cryptocurrency wallet information.  The malware packaged stolen data into an archive and transmitted it to attacker-controlled command-and-control infrastructure, retrying exfiltration if initial attempts failed.  Researchers observed more than 10,000 users accessing malicious instructions, and the Claude artifact alone received over 15,000 views, demonstrating significant exposure. 

Who is affected

macOS users who searched for technical tools or utilities and followed instructions in malicious Claude artifacts or related search results are affected, as executing the provided commands enabled installation of the MacSync infostealer and theft of sensitive data.

Why CISOs should care

The campaign demonstrates how attackers can leverage trusted AI platforms like Claude to distribute malicious instructions and deliver infostealer malware, increasing risk to enterprise macOS systems through AI-generated content and search-based delivery channels.

3 practical actions

  • Monitor macOS systems for suspicious Terminal activity. Detect unauthorized execution of shell commands that retrieve external payloads.
  • Audit macOS endpoints for infostealer indicators. Identify signs of credential harvesting or abnormal archive creation and outbound connections.
  • Educate users on AI-generated instructions. Ensure users understand the risks of executing commands from AI-generated guides or search results.