HomeCyber SecurityLastPass Warns of Faux Repositories Infecting macOS with Atomic Infostealer

LastPass Warns of Faux Repositories Infecting macOS with Atomic Infostealer


Sep 20, 2025Ravie LakshmananSoftware program Safety / Malware

LastPass Warns of Faux Repositories Infecting macOS with Atomic Infostealer

LastPass is warning of an ongoing, widespread data stealer marketing campaign concentrating on Apple macOS customers by faux GitHub repositories that distribute malware-laced applications masquerading as reliable instruments.

“Within the case of LastPass, the fraudulent repositories redirected potential victims to a repository that downloads the Atomic infostealer malware,” researchers Alex Cox, Mike Kosak, and Stephanie Schneider from the LastPass Menace Intelligence, Mitigation, and Escalation (TIME) crew mentioned.

Past LastPass, a number of the in style instruments impersonated within the marketing campaign embody 1Password, Basecamp, Dropbox, Gemini, Hootsuite, Notion, Obsidian, Robinhood, Salesloft, SentinelOne, Shopify, Thunderbird, and TweetDeck, amongst others. All of the GiHub repositories are designed to focus on macOS methods.

The assaults contain using Search Engine Optimization (search engine optimisation) poisoning to push hyperlinks to malicious GitHub websites on high of search outcomes on Bing and Google, that then instruct customers to the obtain this system by clicking the “Set up LastPass on MacBook” button, redirecting them a GitHub web page area.

“The GitHub pages look like created by a number of GitHub usernames to get round takedowns,” LastPass mentioned.

CIS Build Kits

The GitHub web page is designed to take the consumer to a different area that gives ClickFix-style directions to repeat and execute a command on the Terminal app, ensuing within the deployment of the Atomic Stealer malware.

It is price noting comparable campaigns have been beforehand leveraged malicious sponsored Google Adverts for Homebrew to distribute a multi-stage dropper by a bogus GitHub repository that may run detect digital machines or evaluation environments, and decode and execute system instructions to determine reference to a distant server, per safety researcher Dhiraj Mishra.

In current weeks, menace actors have been noticed leveraging public GitHub repositories to host malicious payloads and distribute them through Amadey, in addition to make use of dangling commits equivalent to an official GitHub repository to redirect unwitting customers to malicious applications.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments