More Mac malware from Google search

eclecticlight.co

119 points by kristianp 7 hours ago


emilecantin - 2 hours ago

Attacks like this are not helped by the increasingly-common "curl | bash" installation instructions (e.g. the new "native" Claude Code install)...

Publish through homebrew like a civilized person, please!

b1temy - an hour ago

> Never follow a shortened link without expanding it using a utility like Link Unshortener from the App Store,

I am unfamiliar with the Apple ecosystem, but is there anything special about this specific app that makes it trustworthy (e.g: reputable dev, made by Apple, etc.)? Looking it up, it seems like an $8 app for a link unshortener app.

In any case, there have been malicious sites that return different results based on the headers (e.g: user agent. If it is downloaded via a user-agent of a web browser, return a benign script, if it is curl, return the malicious script). But I suppose this wouldn't be a problem if you directly inspect and use the unshortened link.

> Terminal isn’t intended to be a place for the innocent to paste obfuscated commands

Tale as old as time. Isn't there an attack that was starting to get popular last year on Windows of a "captcha" asking you to hit Super + R, and pasting a command to "verify" your captcha? But I suppose this type of attack has been going on for a long, long, time. I remember Facebook and some other websites used to have a big warning in the developer console, asking not to paste scripts users found online there, as they are likely scams and will not do what they claim the script would do.

---

Side-Note: Is the layout of the website confusing for anyone else? Without borders on the image, (and the image being the same width of the paragraph text) it seemed like part of the page, and I found myself trying to select text on the image, and briefly wondering why I could not do so. Turning on my Dark Reader extension helped a little bit, since the screenshots were on a white background, but it still felt a bit jarring.

ProtectorFox - 6 hours ago

GitHub too https://iboostup.com/blog/ai-fake-repositories-github

aucisson_masque - 5 hours ago

At least macos has file access permissions.

aussieguy1234 - 17 minutes ago

Could the dataset of the LLMs that made these recommendations have been poisoned by, let's say, a Honeypot website specifically designed to cause any LLM that trains on it to recommend malware?

TminusZ - an hour ago

Careful out there.

retired - 6 hours ago

Thanks for reminding me to turn off Full Disk Access for Terminal. I'm not sure why I had that one turned on.

tolerance - 4 hours ago

Another reason to avoid Medium like cold grits.

jeffbee - 5 hours ago

This sucks because the web should be the perfect, safe platform for this kind of application, but it isn't. Technically all the features exist in the browser such that you could write a homedir cleaner, space analyzer, etc purely in a browser tab, but because of the misguided (in my opinion) way that browsers refuse to do open a homedir, it's impossible.

baxtr - 5 hours ago

Actually… I think this be solved by AI answers. I don’t look up commands on random websites, instead I ask an LLM for that kind of stuff. At the very least, check your commands with an LLMs.

tokyobreakfast - 4 hours ago

Are we still pushing the myth that anti-malware on Mac isn't necessary?

etrvic - 5 hours ago

A solution would be to stop shipping macs with the terminal app\s. Computers are now used by a wide variety of people, some without technical knowledge, maybe a default switch on macOS that displays warnings on rather trivial attacks would help.