Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/Threats/Hackers Use Clickious DMG Files to Deliver notnull
Threats

Hackers Use Clickious DMG Files to Deliver notnull

A new macOS info-stealer, named notnullOSX, has emerged, specifically targeting cryptocurrency holders with wallet balances exceeding $10,000. Written in Go, it uses two parallel attack paths —...

Emy Elsamnoudy
Emy Elsamnoudy
April 9, 2026 4 Min Read
4 0

A new macOS info-stealer, named notnullOSX, has emerged, specifically targeting cryptocurrency holders with wallet balances exceeding $10,000.

Written in Go, it uses two parallel attack paths — ClickFix social engineering and malicious DMG disk image files — to silently compromise Apple Mac systems.

The malware is highly targeted, with operators hand-picking each victim through an affiliate panel before launching an attack.

The story behind notnullOSX stretches back to 2022 and a developer known as 0xFFF, who first posted about a rough macOS stealer on underground forums.

After a dramatic exit in 2023 — triggered by a fabricated law enforcement tip reportedly set up by a rival — 0xFFF disappeared, leaving paying subscribers without refunds.

In August 2024, the same actor returned under a new alias, alh1mik, posted an apology, and began taking preorders for a new macOS stealer at $400 per month. By 2026, that offer had materialized.

Moonlock Lab researchers identified and recorded the first detections of notnullOSX on March 30, 2026, across three regions — Vietnam, Taiwan, and Spain.

Their telemetry confirmed how deliberately the malware had been constructed: before targeting anyone, operators must fill out a submission form that includes the victim’s social media profiles, wallet address, and correspondence history.

The minimum wallet threshold is set at $10,000, and submissions below that figure are automatically rejected.

The infection begins with a fake protected Google document, which shows an encryption error and urges the victim to take one of two actions — both leading to the same malware.

The first path uses ClickFix: the victim is told to open Terminal and paste a base64-encoded command, which silently fetches and executes a remote bash installer script.

The second delivers a malicious DMG disk image containing a README, an install script, and a Terminal shortcut, packaged to look entirely routine. In both cases, the victim unknowingly installs the malware without triggering a single security warning.

The distribution network goes further. A fake product page for a wallpaper app called WallSpace was set up at wallpapermacos[.]com, with polished screenshots and a free download button. 

Fake WallSpace product page and ClickFix terminal prompt (Source - Moonlock)
Fake WallSpace product page and ClickFix terminal prompt (Source – Moonlock)

A hijacked YouTube channel, dormant since 2015, promoted the fake app with a single video that accumulated 50,000 views in just two weeks — consistent with paid promotion or SEO manipulation.

Inside the Attack: TCC Bypass and Modular Data Theft

What makes notnullOSX particularly dangerous is how it turns macOS’s own permission system against its users.

Normally, Apple’s Transparency, Consent, and Control (TCC) framework triggers a pop-up every time an app tries to access protected data — messages, notes, browser cookies, and more. notnullOSX sidesteps this by walking victims into manually granting Full Disk Access in System Settings.

Full Disk Access grant in System Settings (Source - Moonlock)
Full Disk Access grant in System Settings (Source – Moonlock)

That single permission covers every protected data category at once, with no further dialogs appearing.

The malware operates through a modular architecture, downloading separate binaries from its C2 server to handle each theft task.

Confirmed modules include iMessageGrab, AppleNotesGrab, CryptoWalletsGrab, BrowserGrab, TelegramGrab, CredsGrab, and ReplaceApp.

Staged module binaries in tmp during execution (Source - Moonlock)
Staged module binaries in tmp during execution (Source – Moonlock)

ReplaceApp is especially alarming: it silently swaps a legitimate hardware wallet app like Ledger Live with a trojanized clone designed to intercept seed phrases at setup.

Even users relying on hardware wallets are at risk if the managing app on their Mac is replaced without any visible sign.

Beyond theft, notnullOSX holds a persistent WebSocket connection to a Firebase-hosted C2 server, sending regular heartbeats and waiting for remote commands — behavior far closer to a remote access trojan than a one-time stealer.

Moonlock Lab’s detection notes recommend that security teams block outbound connections to the known C2 domain, alert on Full Disk Access grants to unrecognized applications, and monitor /tmp for staged Mach-O binaries.

For Mac users and crypto holders, the advice is direct: never paste Terminal commands from a browser or document, treat any app requesting Full Disk Access during installation as suspicious, and check ~/Library/LaunchAgents/ for unfamiliar entries.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

STX RAT Evades Detection with Hidden Remote Uses Desktop

Next Post

ClickFix Campaign Delivers Atomic Stealer via macOS Script

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us