Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
BitUnlocker Downgrade Attacks on Windows Allows Access
May 12, 2026
Exploit: Hackers Take Over cPanel Abuse CVE-2026-41940
May 12, 2026
TanStack npm Supply-Chain Attack Hacks CI Credentials
May 12, 2026
Home/Threats/New Compliance Email Phishing Steals Sensitive Data via
Threats

New Compliance Email Phishing Steals Sensitive Data via

A sophisticated phishing campaign is now leveraging fake compliance emails to deliver advanced malware to macOS users. Chainbase Lab recently detected this campaign, which impersonates legitimate...

Marcus Rodriguez
Marcus Rodriguez
February 3, 2026 3 Min Read
2 0

A sophisticated phishing campaign is now leveraging fake compliance emails to deliver advanced malware to macOS users.

Chainbase Lab recently detected this campaign, which impersonates legitimate audit and compliance notifications to deceive users.

The attack chain combines social engineering with multi-stage fileless payloads designed to steal credentials and establish persistent remote access on victim machines.

Attackers start by requesting users confirm their company’s legal name, then follow up with messages claiming to be from financial auditors or token vesting administrators, complete with malicious attachments.

The attack unfolds through carefully orchestrated steps that trick users into opening weaponized documents. Initial emails ask recipients to provide basic company information, establishing trust before the second wave arrives.

When victims respond, attackers send follow-up messages with subject lines referencing “FY2025 External Audit” or “Token Vesting Confirmation” deadlines.

These messages contain attachments disguised as Word or PDF files, but are actually AppleScript files using double extensions to hide their true nature.

SlowMist analysts identified that the malware employs a multi-stage infection process, with the initial AppleScript file serving as the entry point for downloading and executing additional malicious code.

SlowMist researchers noted the malware’s primary infection vector uses a file named “Confirmation_Token_Vesting.docx.scpt,” which appears legitimate but executes as a script.

The first-stage AppleScript opens fake system settings windows showing software update progress bars to distract users while running malicious code in the background.

AppleScript file (Source - Medium)
AppleScript file (Source – Medium)

The script collects system information including CPU architecture and macOS version, then downloads additional payloads from the suspicious domain sevrrhst[.]com.

Deception Evasion Through Fake System Prompts

The malware’s detection evasion relies heavily on displaying convincing system permission dialogs that impersonate macOS security alerts.

index.js (Source - Medium)
index.js (Source – Medium)

These fake prompts incorporate Google avatar elements to appear legitimate, tricking users into entering their administrator passwords.

Once a password is entered, the script validates it against the system and immediately exfiltrates the credentials to the remote server using Base64 encoding.

Domain sevrrhst[.]com analysis (Source - Medium)
Domain sevrrhst[.]com analysis (Source – Medium)

Beyond credential theft, the malware attempts to bypass macOS TCC protections by injecting SQL statements directly into the privacy database, silently granting itself camera access, screen recording permissions, and keyboard monitoring capabilities.

This persistence mechanism allows the attacker to maintain long-term access and execute arbitrary commands through a Node.js runtime environment established on the compromised machine.

The infrastructure supporting this campaign uses throwaway domains registered in late January 2026, with the command server at sevrrhst[.]com resolving to IP 88.119.171.59, which hosts over ten similar malicious domains used for infrastructure reuse.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurity

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Microsoft Disables NTLM by Default for Secure Authentication

Next Post

PDFly PyInstaller Mod Forces Decryption Reverse- Variant Uses

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Hackers Deliver Malware via Fake DeepSeek TUI GitHub Rep
May 11, 2026
Cybercrime Network Takedown Exposes 22, Crimenetwork Users
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us