{"id":24988,"date":"2025-12-09T04:32:33","date_gmt":"2025-12-09T09:32:33","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24988"},"modified":"2025-12-11T16:44:28","modified_gmt":"2025-12-11T12:44:28","slug":"share-chatgpt-chat-clickfix-macos-amos-infostealer","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/24988\/","title":{"rendered":"Infostealer has entered the chat"},"content":{"rendered":"<p>Infostealers \u2014 malware that steals passwords, cookies, documents, and\/or other valuable data from computers \u2014 have become <a href=\"https:\/\/lp.kaspersky.com\/global\/ksb2025-number-of-the-year\/\" target=\"_blank\" rel=\"noopener nofollow\">2025\u2019s fastest-growing cyberthreat<\/a>. This is a critical problem for all operating systems and all regions. To spread their infection, criminals use every possible trick to use as bait. Unsurprisingly, AI tools have become one of their favorite luring mechanisms this year. In a new campaign discovered by Kaspersky experts, the attackers steer their victims to a website that supposedly contains user guides for installing OpenAI\u2019s new Atlas browser for macOS. What makes the attack so convincing is that the bait link leads\u00a0to\u2026 the official ChatGPT website! But how?\n<\/p>\n<h2>The bait-link in search results<\/h2>\n<p>\nTo attract victims, the malicious actors place paid search ads on Google. If you try to search for \u201cchatgpt atlas\u201d, the very first sponsored link could be a site whose full address isn\u2019t visible in the ad, but is clearly located on the <em>chatgpt.com<\/em> domain.<\/p>\n<p>The page title in the ad listing is also what you\u2019d expect: \u201cChatGPT\u2122 Atlas for macOS \u2013 Download ChatGPT Atlas for Mac\u201d. And a user wanting to download the new browser could very well click that link.<\/p>\n<div id=\"attachment_54930\" style=\"width: 855px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/12\/09133335\/share-chatgpt-chat-clickfix-macos-amos-infostealer-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54930\" class=\"size-full wp-image-54930\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/12\/09133335\/share-chatgpt-chat-clickfix-macos-amos-infostealer-1.png\" alt=\"A sponsored link to a malware installation guide in Google search results \" width=\"845\" height=\"464\"><\/a><p id=\"caption-attachment-54930\" class=\"wp-caption-text\">A sponsored link in Google search results leads to a malware installation guide disguised as ChatGPT Atlas for macOS and hosted on the official ChatGPT site. How can that be?<\/p><\/div>\n<h2>The Trap<\/h2>\n<p>\nClicking the ad does indeed open chatgpt.com, and the victim sees a brief installation guide for the \u201cAtlas browser\u201d. The careful user will immediately realize this is simply some anonymous visitor\u2019s conversation with ChatGPT, which the author made public using the Share feature. Links to shared chats begin with <em>chatgpt.com\/share\/<\/em>. In fact, it\u2019s clearly stated right above the chat: \u201cThis is a copy of a conversation between ChatGPT &amp; anonymous\u201d.<\/p>\n<p>However, a less careful or just less AI-savvy visitor might take the guide at face value \u2014 especially since it\u2019s neatly formatted and published on a trustworthy-looking site.<\/p>\n<p>Variants of this technique have been seen before \u2014 attackers have abused other services that allow sharing content on their own domains: malicious documents in Dropbox, phishing in <a href=\"https:\/\/www.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/39828\/\" target=\"_blank\" rel=\"noopener nofollow\">Google Docs<\/a>, malware in <a href=\"https:\/\/www.kaspersky.com\/blog\/beware-github-malicious-links\/51203\/\" target=\"_blank\" rel=\"noopener nofollow\">unpublished comments on GitHub and GitLab<\/a>, crypto traps in <a href=\"https:\/\/www.kaspersky.com\/blog\/google-forms-scam\/53909\/\" target=\"_blank\" rel=\"noopener nofollow\">Google Forms<\/a>, and more. And now you can also share a chat with an AI assistant, and the link to it will lead to the chatbot\u2019s official website.<\/p>\n<p>Notably, the malicious actors used prompt engineering to get ChatGPT to produce the exact guide they needed, and were then able to clean up their preceding dialog to avoid raising suspicion.<\/p>\n<div id=\"attachment_54931\" style=\"width: 1060px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/12\/09133339\/share-chatgpt-chat-clickfix-macos-amos-infostealer-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54931\" class=\"wp-image-54931 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/12\/09133339\/share-chatgpt-chat-clickfix-macos-amos-infostealer-2.png\" alt=\"Malware installation instructions disguised as Atlas for macOS \" width=\"1050\" height=\"759\"><\/a><p id=\"caption-attachment-54931\" class=\"wp-caption-text\">The installation guide for the supposed Atlas for macOS is merely a shared chat between an anonymous user and ChatGPT in which the attackers, through crafted prompts, forced the chatbot to produce the desired result and then sanitized the dialog<\/p><\/div>\n<h2>The infection<\/h2>\n<p>\nTo install the \u201cAtlas browser\u201d, users are instructed to copy a single line of code from the chat, open Terminal on their Macs, paste and execute the command, and then grant all required permissions.<\/p>\n<p>The specified command essentially downloads a malicious script from a suspicious server, <em>atlas-extension{.}com<\/em>, and immediately runs it on the computer. We\u2019re dealing with a variation of the <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/\" target=\"_blank\" rel=\"noopener nofollow\">ClickFix attack<\/a>. Typically, scammers suggest \u201crecipes\u201d like these for passing CAPTCHA, but here we have steps to install a browser. The core trick, however, is the same: the user is prompted to manually run a shell command that downloads and executes code from an external source. Many already know not to run files downloaded from shady sources, but this doesn\u2019t look like launching a file.<\/p>\n<p>When run, the script asks the user for their system password and checks if the combination of \u201ccurrent username + password\u201d is valid for running system commands. If the entered data is incorrect, the prompt repeats indefinitely. If the user enters the correct password, the script downloads the malware and uses the provided credentials to install and launch it.\n<\/p>\n<h2>The infostealer and the backdoor<\/h2>\n<p>\nIf the user falls for the ruse, a common infostealer known as <a href=\"https:\/\/securelist.com\/kral-amos-vidar-acr-stealers\/114237\/\" target=\"_blank\" rel=\"noopener\">AMOS<\/a> (Atomic macOS Stealer) will launch on their computer. AMOS is capable of collecting a wide range of potentially valuable data: passwords, cookies, and other information from Chrome, Firefox, and other browser profiles; data from crypto wallets like Electrum, Coinomi, and Exodus; and information from applications like Telegram Desktop and OpenVPN Connect. Additionally, AMOS steals files with extensions TXT, PDF, and DOCX from the Desktop, Documents, and Downloads folders, as well as files from the Notes application\u2019s media storage folder. The infostealer packages all this data and sends it to the attackers\u2019 server.<\/p>\n<p>The cherry on top is that the stealer installs a backdoor, and configures it to launch automatically upon system reboot. The backdoor essentially replicates AMOS\u2019s functionality, while providing the attackers with the capability of remotely controlling the victim\u2019s computer.\n<\/p>\n<h2>How to protect yourself from AMOS and other malware in AI chats<\/h2>\n<p>\nThis wave of new AI tools allows attackers to repackage old tricks and target users who are curious about the new technology but don\u2019t yet have extensive experience interacting with large language models.<\/p>\n<p>We\u2019ve already written about a <a href=\"https:\/\/www.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/54769\/\" target=\"_blank\" rel=\"noopener nofollow\">fake chatbot sidebar for browsers<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/53116\/\" target=\"_blank\" rel=\"noopener nofollow\">fake DeepSeek and Grok clients<\/a>. Now the focus has shifted to exploiting the interest in OpenAI Atlas, and this certainly won\u2019t be the last attack of its kind.<\/p>\n<p>What should you do to protect your data, your computer, and your money?\n<\/p>\n<ul>\n<li><strong>Use <a href=\"https:\/\/me-en.kaspersky.com\/home-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">reliable anti-malware protection<\/a><\/strong> on all your smartphones, tablets, and computers, including those running <a href=\"https:\/\/me-en.kaspersky.com\/mac-antivirus?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kism____e20b10d3067ace76\" target=\"_blank\" rel=\"noopener\">macOS<\/a>.<\/li>\n<li>If any website, instant message, document, or chat asks you to <strong>run any commands<\/strong> \u2014 like pressing <em>Win+R<\/em> or <em>Command+Space<\/em> and then launching PowerShell or Terminal \u2014 <strong>don\u2019t<\/strong>. You\u2019re very likely facing a ClickFix attack. Attackers typically try to draw users in by urging them to fix a \u201cproblem\u201d on their computer, neutralize a \u201cvirus\u201d, \u201cprove they are not a robot\u201d, or \u201cupdate their browser or OS now\u201d. However, a more neutral-sounding option like \u201cinstall this new, trending tool\u201d is also possible.<\/li>\n<\/ul>\n<ul>\n<li><strong>Never follow any guides<\/strong> you didn\u2019t ask for and don\u2019t fully understand.<\/li>\n<\/ul>\n<ul>\n<li><strong>The easiest thing to do is immediately close the website or delete the message<\/strong> with these instructions. But if the task seems important, and you can\u2019t figure out the instructions you\u2019ve just received, consult someone knowledgeable. A second option is to simply paste the suggested commands into a chat with an AI bot, and ask it to explain what the code does and whether it\u2019s dangerous. ChatGPT typically handles this task fairly well.<\/li>\n<\/ul>\n<div id=\"attachment_54933\" style=\"width: 1255px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/12\/09133343\/share-chatgpt-chat-clickfix-macos-amos-infostealer-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54933\" class=\"size-full wp-image-54933\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/12\/09133343\/share-chatgpt-chat-clickfix-macos-amos-infostealer-3.png\" alt=\"ChatGPT warns that following the malicious instructions is risky \" width=\"1245\" height=\"853\"><\/a><p id=\"caption-attachment-54933\" class=\"wp-caption-text\">If you ask ChatGPT whether you should follow the instructions you received, it will answer that it\u2019s not safe<\/p><\/div>\n<blockquote><p>How else do malicious actors use AI for deception?<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/54769\/\" target=\"_blank\" rel=\"noopener nofollow\">AI sidebar spoofing: a new attack on AI browsers<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/54808\/\" target=\"_blank\" rel=\"noopener nofollow\">Attacks using Syncro &amp; AI-generated websites<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ai-phishing-and-scams\/54445\/\" target=\"_blank\" rel=\"noopener nofollow\">How phishers and scammers use AI<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/53116\/\" target=\"_blank\" rel=\"noopener nofollow\">Trojans masquerading as DeepSeek and Grok clients<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-deepfakes-threaten-kyc\/51987\/\" target=\"_blank\" rel=\"noopener nofollow\">How fraudsters bypass customer identity verification using deepfakes<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"premium-generic\" value=\"23742\">\n","protected":false},"excerpt":{"rendered":"<p>A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot&#8217;s chat-sharing feature.<\/p>\n","protected":false},"author":2787,"featured_media":24993,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2088,1481,1583,2865,111,1520,1217,2611,2829,1505,22,2799,1328,127,521],"class_list":{"0":"post-24988","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-tips","9":"tag-ai","10":"tag-artificial-intelligence","11":"tag-atlas","12":"tag-attacks","13":"tag-backdoors","14":"tag-chatbots","15":"tag-chatgpt","16":"tag-clickfix","17":"tag-cryptocurrencies","18":"tag-google","19":"tag-infostealers","20":"tag-macos","21":"tag-osx","22":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/24988\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/29919\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/29796\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/28850\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/41014\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/14128\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/54928\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/33027\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/30010\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/35718\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/share-chatgpt-chat-clickfix-macos-amos-infostealer\/35346\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/macos\/","name":"macOS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2787"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24988"}],"version-history":[{"count":11,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24988\/revisions"}],"predecessor-version":[{"id":25020,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24988\/revisions\/25020"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24993"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}