Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
May 11, 2026
Google reCAPTCHA Update Blocks Privacy-Focused Android
May 11, 2026
Vidar Malware Steals Browser Credentials, Wallets &
May 11, 2026
Home/CyberSecurity News/macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
CyberSecurity News

macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate

Threat actors have launched a sophisticated malvertising campaign specifically targeting macOS users, leveraging poisoned Google Ads and deceptive artificial intelligence applications. Researchers...

Marcus Rodriguez
Marcus Rodriguez
May 11, 2026 3 Min Read
1 0

Threat actors have launched a sophisticated malvertising campaign specifically targeting macOS users, leveraging poisoned Google Ads and deceptive artificial intelligence applications.

Researchers recently uncovered an operation that redirects victims to fraudulent landing pages via sponsored search results.

By combining trusted hosting platforms with the notorious “Clickfix” social engineering tactic, attackers are successfully distributing MacSync payloads and dangerous macOS information stealers.

The attack chain begins when a user searches for popular software, particularly AI tools like Claude.

macOS Malware Ads

Attackers manipulate search engine results by purchasing sponsored ads that appear at the top of search results pages.

Because these ads often mimic legitimate vendors, end users struggle to distinguish them from authentic links.

Search ads redirect users to malicious sites delivering MacSync ClickFix payloads(source : x)
Search ads redirect users to malicious sites delivering MacSync ClickFix payloads(source : x)

When clicked, these sponsored advertisements route victims to deceptive websites hosted on trusted infrastructure.

To bypass initial domain reputation checks and enterprise web filters, threat actors are leveraging services like Google Sites, Framer, and even legitimate claude.ai shared chats.

The landing pages are carefully designed to look like official Claude AI download portals.

Google Ads and Claude.ai chats spread fake MacSync installers(source :x)
Google Ads and Claude.ai chats spread fake MacSync installers(source :x)

When users attempt to interact with the site or download the purported desktop application, they are hit with a Clickfix prompt.

This prompt uses deceptive warning dialogues to trick victims into manually executing a malicious terminal command or downloading a compromised installer under the guise of “fixing” a display error.

Researchers Berk Albayrak and g0njxa published findings on X tracing the infrastructure behind the targeted malware campaign.

The threat actors frequently rotate their domains and hosting platforms to evade detection while maximizing their search engine optimization.

The campaign relies heavily on Google Sites to host the initial deceptive pages, with researchers identifying malicious URLs such as sites[.]google[.]com/view/cloud-version-08, sites[.]google[.]com/view/brewshka-page, and sites[.]google[.]com/view/claud-version-0505.

In addition to Google Sites, the attackers have utilized the Framer platform, hosting fake applications at claude-desktop-app[.]framer[.]ai.

Payload Delivery and Execution

Once the victim interacts with the fake Claude AI portal, the site redirects them to the final payload delivery servers.

The initial landing pages have been observed redirecting traffic to external IP addresses, such as 2[.]26[.]75[.]112/Hokojol, and to domains such as pieoneer[.]org and greenactiv[.]com.

MacSync clickfix payload(source : x)
MacSync clickfix payload(source : x)

These destination servers drop the MacSync clickfix payload directly onto the victim’s machine. Upon execution, the malware operates as a comprehensive macOS stealer.

It is specifically designed to harvest sensitive information from the infected Apple system, including saved browser credentials, cryptocurrency wallet data, and active session tokens.

The stolen data is subsequently exfiltrated back to the attackers’ command-and-control infrastructure.

To defend against these deceptive malvertising campaigns, organizations and individual users must exercise extreme caution when interacting with sponsored search results.

Security teams should block the known indicators of compromise at the network level and monitor macOS endpoint telemetry for unusual script execution originating from web browsers.

Please educate users to avoid clicking on sponsored software download ads. They should always navigate directly to official vendor websites.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Google reCAPTCHA Update Blocks Privacy-Focused Android

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
10 Best Full Disk Encryption Tools in 2026
May 11, 2026
ODINI Malware Breaches Air-Gapped Exploits Magnetic
May 11, 2026
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us