Fake macOS tutorials are spreading the new SHAMOS stealer: Header image
Emerging Threats 8 min read

Fake macOS tutorials are spreading the new Shamos stealer

Published:Aug 29, 2025

Apple users are being targeted in a new stealer malware campaign. Cybercriminals, operators of the malware developed and distributed by Cookie Spider, are luring Mac users with fake IT support pages to steal their crypto and data.  

On August 20, CrowdStrike reported that its Falcon platform had identified and prevented over 300 malware intrusion attempts against Apple users. We took a closer look at their findings and did some browsing of our own to figure out what was going on and how it affected Mac users. 

A new take on an old favorite: The IT Mac support scam with a dangerous twist 

Let’s say you want to hook up a new printer to your Mac but are struggling to make it work. Naturally, like most of us, you might turn to Google. You might ask, “How can I connect my printer to my Mac?”

If the problem is more technical, you might ask, “How do I wipe the cache on my Mac?”

It turns out, cybercriminals are one step ahead of you. Scammers have designed fake IT macOS support pages (now offline) with detailed instructions to help you troubleshoot your problem.

A ClickFix screenshot shared by ClickStrike titled "How to Connect a Printer to Your Mac."
This ClickFix screenshot was shared by ClickStrike. Image: Screenshot, Moonlock.

These fake pages can appear at the top of the first page of Google results, leading users to what looks like a legitimate company that wants to help Apple users. The pages come with instructions. 

However, if you do follow the instructions on these sites (again, now defunct), you will install a variant of the Atomic macOS (AMOS) stealer, dubbed Shamos. The Shamos stealer is distributed by the cybercriminal group Cookie Spider, but it can be used by anyone who rents it out on the dark web. 

The fake sites are sponsored, meaning that someone paid Google Ads to run them. We looked into the ads and who advertises them. All signs seem to point to scenarios in which legitimate and, at times, verified Google Ads users have their accounts taken over by cybercriminals.

A screenshot of a user running ads in this threat campaign distributing malware.
Another user, with a verified identity on Google Ads, is shown running ads in this threat campaign, distributing malware. Image: Screenshot, Moonlock.
A screenshot of Google Ads linked to this campaign.
A screenshot shows several ads on Google Ads linked to this campaign. Image: Screenshot, Moonlock.

Tracing WHOIS data on fake Apple IT pages

Tracing these campaigns back to their points of origin — in other words, finding out who exactly is behind this new threat — is a technical nightmare. Not only that, but it’s a dead end.

The WHOIS information we checked out also appears to point to legitimate sites or companies that have either been spoofed or have had their accounts or servers (domains) hacked and taken over. This is a common tactic among cybercriminals.

A screenshot of WHOIS data on one of the sites involved in this campaign.
WHOIS data shows information on one of the sites involved in this campaign. Image: Screenshot, Moonlock.

Beyond the knowledge of how to use a stealer, it appears that the operators using this variant of the Spider Cookie malware, Shamos, understand how to set up fake domains. They have the skills to generate convincing sites and abuse Google Ads while spoofing companies. They could also be getting this knowledge and tools from malware distributors like Cookie Spider. 

Most of the ads we checked out target viewers in the United States. The accounts being spoofed are from Australia. CyberStrike’s report said that other countries were also targeted in this threat campaign.

A screenshot of the Google Ads Transparency Center.
A search on Google Ads Transparency Center showed us what seems to be an account taken over from a legitimate user with previous unrelated ads. Image: Screenshot, Moonlock.

Circling back to Apple users: What you should know to stay safe. 

It’s important to know that impersonating IT support sites is not a novel technique. However, it is something we haven’t seen in quite some time.

Usually, bad actors operating macOS stealers like AMOS will abuse the Google Ad platform for malvertising. These days, however, their lures tend to move in the direction of crypto holders and popular fake software downloads, like impersonating Slack.  

Impersonating IT Mac support companies is something new. This makes it a threat that Apple users should keep on their radar.

A screenshot showing ads linked to the campaign.
This image shows more ads linked to this campaign. Image: Screenshot, Moonlock.

If you have a technical question about your Mac, we suggest that you go through the official Apple support pages, talk face-to-face to your trusted local neighborhood IT Apple guy, or consult online community sites where technology experts and users can help you answer your question. Overall, always be cautious when getting tips on how to troubleshoot or improve your Mac experience.  

A screenshot of one of the fake ads that ran on Google Ads linked to this campaign.
Shown here is one of the fake ads that ran on Google Ads linked to this campaign. Image: Screenshot, Moonlock.

ClickFix attacks are all the rage today, but why?

It is noteworthy that this new cybercriminal campaign leverages different techniques, one of which has been on the rise against Mac users: ClickFix attacks. 

In a ClickFix attack, scammers try to trick users into copying and pasting code that triggers the download of malware or malicious payloads. This is usually done by abusing the macOS terminal.

The reason why this attack is so common in Apple environments today is that Macs’ built-in cybersecurity technologies (specifically Gatekeeper) are highly effective at detecting and blocking suspicious and malicious downloads.

ClickFix attacks are a simple way to bypass Apple controls. When you paste code or instruct your macOS terminal to run a series of commands, it does so assuming (a) that you know what you are doing and (b) that whatever instructions you give it have full administrator privileges. 

Bottom line: Do not paste and copy code from unverified sources into your Mac terminal. You do so at your own risk, considering all that can go wrong.  

A screenshot of the ClickFix attack message.
CrowdStrike shared the ClickFix attack message that bad actors use to trick Mac users. Image: Screenshot, Moonlock.

Using your Mac against you: How black hat hackers weaponize AppleScript and other built-in Apple tools

Building on this same hacker-style creativity, macOS stealers are now starting to abuse AppleScript and other built-in system tools that every Mac ships with.

This type of malware gives your Mac instructions in its own language (quietly, in the background), so nothing looks suspicious. From a developer’s perspective, this kind of “no-code” approach to Apple malware is worth following closely.

An image shows the malicious code shared by CrowdStrike linked to this campaign.
The malicious code shared here by CrowdStrike was linked to this campaign. Image: Screenshot, Moonlock.

Other key factors to know about the Shamos malware

The Shamos malware executes anti-virtual machine commands to ensure that it’s not running in a sandbox environment. It does this to make the work of cybersecurity researchers more complicated than it already is. The use of sandboxed, isolated virtual machine environments is how researchers can download and analyze malware in a safe space.

As mentioned above, Shamos uses AppleScript. This malware seeks known cryptocurrency wallet files and sensitive credential-based files on your disk.

Besides crypto wallets, Shamos can steal passwords or seed phrases stored in Keychain. It can also collect other sensitive files and steal data from Apple Notes and browsers.

And that’s not all. Shamos can download additional malware, as is the case with a spoofed Ledger Live wallet application and a botnet module. It is also coded for persistence. 

Indicators of compromise (IoC) or sites identified in this campaign to block and stay away from include: 

  • www.rescue-mac[.]com
  • www.mac-safer[.]com

CrowdStrike said users in the following countries have been targeted with fake IT Mac support ads via Google Ads: 

  • The United States
  • The United Kingdom
  • Japan 
  • China 
  • Colombia 
  • Canada 
  • Mexico 
  • Italy
  • And others

What’s up with all these Spiders?  

As mentions of threat actors using the word “Spider” in their alias, malware or group names, or campaigns continue to rise, we note that the cybercriminal ecosystem — comprising malware developers, distributors, gangs, and recruited operators — increasingly resembles a complex spider web.

This spider web metaphor illustrates the tangled and sophisticated nature of modern, financially motivated cybercrime, where sole attribution is virtually impossible.

CrowdStrike links the malware in this campaign to Cookie Spider, which, in turn, it links to the Russian cybercrime forums and environment. However, this connection only reflects the malware’s origin, not the identity of the operators running this campaign.

Screenshot of mac-safe malware distributing site, now offline.
Mac-Safer[.com] is a fake Apple IT service site distributing malware. The site itself is gone, but it still has a Google Ad tracking cookie, as the warning in yellow shows. Image: Screenshot, Moonlock.

What we do know is that other traits in this campaign — such as the focus on crypto, the large-scale financially motivated operations, the sophistication in covering digital tracks, and the targeted countries — align with threat actors and malware operators in Southeast Asia, a hub for transnational criminal syndicates.

While direct evidence linking Russian-speaking cybercrime forums to Southeast Asian gangs and triads remains limited to date, there are notable intersections between Russian cybercriminal activities and malware and organized cybercriminal groups in Southeast Asia. 

In another example of how sophisticated these transnational criminal operations are, a recent sweeping INTERPOL-coordinated operation with local authorities across Africa resulted in the arrest of 1,209 cybercriminals targeting nearly 88,000 victims. Among those arrested, 60 are Chinese nationals.

A screenshot of the Interpol press release on African cybercriminal syndicate disruption.
Interpol shared an official press release on the disruption of an African cybercriminal syndicate. The operation was linked to human trafficking and pig butchering. Image: Screenshot, Moonlock.

The African cybercriminal operation was also linked to human trafficking, pig butchering scams, and other common cyberattacks and frauds that relentlessly prey upon online victims every day. 

Law enforcement agencies and local authorities around the world face the unique and complex double challenge of not only shutting down malware developers and distributors but also operators and other human elements linked to this “spider-style” cybercriminal model.  

As an Apple user, why should I care about the cybercriminal landscape and who is behind it?

Often, the difference between those developing malware, those leasing it on the dark web, and those deploying it in the wild (whether cybercriminal gangs, recruited operators, or low-level independent actors) isn’t always clear.

For Apple users, distinguishing between these roles may seem irrelevant, but it is crucial. By demystifying the structure and operations of the cybercriminal ecosystem, the psychological leverage that attackers rely on — fear, confusion, and uncertainty — loses its power, reducing the likelihood of successful exploitation.

Final thoughts

The new Shamos malware campaign identified by CrowdStrike presents several noteworthy elements. The combined use of malvertising and a macOS stealer, sided with a ClickFix technique, is all part of a broader trend gaining popularity in the criminal underworld.

While the campaign is ultimately after victims’ wallets, user data and business data are also at risk. As we mentioned, this campaign, linked to Cookie Spiders, acts within the wider dark web umbrella of the malware end-to-end global industry.

That means this malware isn’t the first of its kind, nor will it be the last.

This is an independent publication, and it has not been authorized, sponsored, or otherwise approved by Apple Inc. Mac and macOS are trademarks of Apple Inc.

MoonLock Banner
Ray Fernandez

Ray Fernandez

Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.