Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Strengthening Public Sector Ransomware Defense

February 17, 2026

Shielding Your Future: Top 10 Risks in Copilot Studio Security

February 16, 2026

Operation DoppelBrand: Harnessing Fortune 500 Power

February 16, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Malware Alert: Phony GitHub Pages Target Mac Users
Cyber Updates

Malware Alert: Phony GitHub Pages Target Mac Users

Staff WriterBy Staff WriterSeptember 22, 2025Updated:October 25, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Fast Facts

  1. SEO Poisoning Attack: A new campaign is targeting Mac users through targeted SEO poisoning, misleading them to malicious GitHub repositories posing as legitimate software.

  2. Infostealer Deployment: The campaign includes repositories that claim to offer genuine MacOS software but actually deliver the Atomic infostealer (AMOS) when users follow instructions provided on the fake pages.

  3. Wide-ranging Targets: LastPass reports that various tech and financial companies were targeted, with the campaign utilizing multiple fake GitHub accounts to create convincing listings.

  4. Mitigation Recommendations: Users are urged to download software only from official app stores and to use robust antivirus protection, along with secure storage methods like password managers to prevent potential data theft.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘Attackers Use Phony GitHub Pages to Deliver Mac Malware’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

An emerging threat campaign is using targeted SEO poisoning to hit Mac users with infostealers.

That’s according to LastPass’s Threat Intelligence, Mitigation, and Escalation (TIME) team, which on Sept. 18 published a blog post dedicated to an emerging threat campaign involving phony GitHub pages claiming to be from legitimate companies. Code repositories have been used in several attacks lately, including the Shai-Hulud worm, the compromise of prolific NPM developer Qix, the Salesloft breach, and more.

According to LastPass blog post authors Alex Cox, Mike Kosak, and Stephanie Schneider, threat actors are publishing GitHub repositories containing malware that claim to be MacOS versions of legitimate software, all the while leveraging SEO to ensure the fake repositories are positioned well in search results.

GitHub Mac Attack

LastPass said the campaign has targeted a range of companies across the technology and financial sectors, including LastPass. In that case, researchers discovered two fake listings from GitHub users for repositories offering “LastPass Premium on MacBook.” The pages used in the campaign were created by multiple GitHub usernames and are littered with MacOS-related terminology.

The site included a download link that instructs users to paste a specific line of code into the Mac terminal. That code, at least in the case of the fake LastPass pages, leads to the download and execution of the Atomic infostealer (also known as AMOS).

Related:Microsoft Disrupts ‘RaccoonO365’ Phishing Service

Both pages were created on GitHub on Sept. 16, and LastPass said “these sites were immediately submitted for takedown and are now inactive.”

This type of thing has been done before; LastPass cited research published in July detailing a similar social engineering campaign in which attackers claimed to offer a MacOS version of package manager Homebrew on GitHub. Following the page’s instructions would similarly lead to malware installations.

And last month, CrowdStrike detailed a campaign by a threat group it tracks as Cookie Spider. The group attempted to compromise more than 300 customer environments using “SHAMOS,” a variant of the aforementioned Atomic infostealer. The campaign similarly utilized malvertising to get its stealer into victim environments, which CrowdStrike said was blocked by its Falcon platform.

“Operating as malware-as-a-service, COOKIE SPIDER rents this information stealer to cybercriminals who deploy it to harvest sensitive information and cryptocurrency assets from victims,” CrowdStrike said in its research. “The campaign utilized malvertising to direct users to fraudulent macOS help websites where victims were instructed to execute a malicious one-line installation command.”

Related:Self-Replicating ‘Shai-hulud’ Worm Targets NPM Packages

CrowdStrike’s research tracked the Cookie Spider campaign back to June, but the Atomic infostealer has been active since at least April 2023, LastPass said.

Mitigating the Mac Attack

Dark Reading asked LastPass why Mac users in particular have been targeted by this campaign and malware. Kosak, senior principal intelligence analyst at LastPass, hypothesizes that the group behind the malware may prefer to focus on macOS systems; the attackers may view Mac users “as something of a low-hanging fruit since the dangerous impression that Macs face less of a malware threat continues to linger.”

To mitigate this threat and others like it, Kosak says organizations and users should only download software from legitimate app stores or, in the case of GitHub, confirm that the repository is managed by the relevant company itself. Although, as Kosak notes, “this can be trickier” when considering recent supply chain attacks like those targeting NPM users.

To defend against infostealers, Kosak recommended using current antivirus or EDR protection and, as expected from LastPass, to avoid “storing your credentials or other sensitive information in your browser and [consider] using a password manager or other secure storage method instead.”

Related:‘Lies-in-the-Loop’ Attack Defeats AI Coding Agents

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Discover More Technology Insights

Learn how the Internet of Things (IoT) is transforming everyday life.

Explore past and present digital transformations on the Internet Archive.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRansomware Paralyzes Major Airports, Causing Widespread Delays
Next Article Cyber Threats Unleashed: Chrome 0-Day, AI Hacking, DDR5 Vulnerabilities & npm Worm
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Strengthening Public Sector Ransomware Defense

February 17, 2026

Bespin Global Unveils SecureAid: Revolutionizing AI-Driven Security

February 16, 2026

SimSpace Expands: New Global Headquarters in Orlando!

February 15, 2026

Comments are closed.

Latest Posts

LockBit 5.0 Targets Windows, Linux, and ESXi Systems

February 16, 2026

Bridging the Gap: Connecting Through Shared Risk Understanding

February 16, 2026

Decade Later: Bangladesh Bank Cyberheist Sparks New Cyber-Resiliency Lessons

February 16, 2026

Threat Actor Offers Critical OpenSea 0-Day Exploit Chain on Hacking Forums

February 14, 2026
Don't Miss

Strengthening Public Sector Ransomware Defense

By Staff WriterFebruary 17, 2026

Summary Points Strategic Partnership: SecuritySnares partners with Carahsoft to enhance ransomware prevention technology accessibility for…

Bespin Global Unveils SecureAid: Revolutionizing AI-Driven Security

February 16, 2026

SimSpace Expands: New Global Headquarters in Orlando!

February 15, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Strengthening Public Sector Ransomware Defense
  • Shielding Your Future: Top 10 Risks in Copilot Studio Security
  • Operation DoppelBrand: Harnessing Fortune 500 Power
  • LockBit 5.0 Targets Windows, Linux, and ESXi Systems
  • Bridging the Gap: Connecting Through Shared Risk Understanding
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Strengthening Public Sector Ransomware Defense

February 17, 2026

Shielding Your Future: Top 10 Risks in Copilot Studio Security

February 16, 2026

Operation DoppelBrand: Harnessing Fortune 500 Power

February 16, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.