Overview
- Security researchers say attackers are buying Google search ads that lead to real Claude shared chats which pose as setup guides for Mac.
- Victims are told to paste a base64 command into Terminal, which fetches a loader script that runs in memory and avoids leaving files on disk.
- One branch profiles the machine and then uses macOS’s osascript to run a second‑stage payload, giving remote code execution without a traditional app.
- BleepingComputer verified a second chat using separate infrastructure and serving uniquely obfuscated payloads per request, a polymorphic tactic that hinders detection.
- Malwarebytes, which published new guidance Tuesday, warns the payload acts like a MacSync infostealer that can steal browser logins, cookies, Keychain items, and crypto wallet data, and urges users to avoid sponsored results and follow only Anthropic’s official documentation.