Particle.news
Download on the App Store

Google Ads and Shared Claude Chats Are Being Weaponized to Infect Macs

The campaign exploits trust in real domains to bypass the telltale signs of fake installers.

Overview

  • Security researchers say attackers are buying Google search ads that lead to real Claude shared chats which pose as setup guides for Mac.
  • Victims are told to paste a base64 command into Terminal, which fetches a loader script that runs in memory and avoids leaving files on disk.
  • One branch profiles the machine and then uses macOS’s osascript to run a second‑stage payload, giving remote code execution without a traditional app.
  • BleepingComputer verified a second chat using separate infrastructure and serving uniquely obfuscated payloads per request, a polymorphic tactic that hinders detection.
  • Malwarebytes, which published new guidance Tuesday, warns the payload acts like a MacSync infostealer that can steal browser logins, cookies, Keychain items, and crypto wallet data, and urges users to avoid sponsored results and follow only Anthropic’s official documentation.