17.6 C
Canberra
Monday, March 2, 2026

LastPass Warns of Faux Repositories Infecting macOS with Atomic Infostealer


Sep 20, 2025Ravie LakshmananSoftware program Safety / Malware

LastPass Warns of Faux Repositories Infecting macOS with Atomic Infostealer

LastPass is warning of an ongoing, widespread info stealer marketing campaign focusing on Apple macOS customers by means of pretend GitHub repositories that distribute malware-laced packages masquerading as respectable instruments.

“Within the case of LastPass, the fraudulent repositories redirected potential victims to a repository that downloads the Atomic infostealer malware,” researchers Alex Cox, Mike Kosak, and Stephanie Schneider from the LastPass Menace Intelligence, Mitigation, and Escalation (TIME) staff mentioned.

Past LastPass, a number of the in style instruments impersonated within the marketing campaign embody 1Password, Basecamp, Dropbox, Gemini, Hootsuite, Notion, Obsidian, Robinhood, Salesloft, SentinelOne, Shopify, Thunderbird, and TweetDeck, amongst others. All of the GiHub repositories are designed to focus on macOS techniques.

The assaults contain using Search Engine Optimization (search engine optimization) poisoning to push hyperlinks to malicious GitHub websites on prime of search outcomes on Bing and Google, that then instruct customers to the obtain this system by clicking the “Set up LastPass on MacBook” button, redirecting them a GitHub web page area.

“The GitHub pages seem like created by a number of GitHub usernames to get round takedowns,” LastPass mentioned.

CIS Build Kits

The GitHub web page is designed to take the consumer to a different area that gives ClickFix-style directions to repeat and execute a command on the Terminal app, ensuing within the deployment of the Atomic Stealer malware.

It is price noting related campaigns have been beforehand leveraged malicious sponsored Google Advertisements for Homebrew to distribute a multi-stage dropper by means of a bogus GitHub repository that may run detect digital machines or evaluation environments, and decode and execute system instructions to ascertain reference to a distant server, per safety researcher Dhiraj Mishra.

In current weeks, risk actors have been noticed leveraging public GitHub repositories to host malicious payloads and distribute them through Amadey, in addition to make use of dangling commits equivalent to an official GitHub repository to redirect unwitting customers to malicious packages.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles