InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Technology

LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

September 20, 2025 2 Min Read
Share
LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
SHARE

LastPass warns of a continuous and widespread information steeler campaign targeting Apple MacOS users via fake GitHub repositories that distribute malware-covered programs pose as legitimate tools.

“In the case of LastPass, the fraudulent repository redirected potential victims to a repository that downloads Atomic Infostealer malware,” researchers Alex Cox, Mike Kosak and Stephanie Schneider said from LastPass’ Threat Intelligence, Mitigation and Escalization (Time) team.

Beyond the last pass, popular tools that impersonate campaigns include 1Password, Basecamp, Dropbox, Gemini, Hootsuite, Concepts, Obsidian, Robinhood, Salesloft, Sentinelone, Shopifififififififififififififififififififififide, Thunderbird, Tweetdeck, and more. All GIHUB repositories are designed to target MacOS systems.

The attack includes the use of search engine optimization (SEO) addiction, pushing a link to the malicious Github site above in Bing and Google search results, clicking the “Install LastPass on MacBook” button to download the program, and redirecting the GitHub page domain.

“Github pages are created with multiple Github usernames and appear to avoid Takedowns,” says LastPass.

The GitHub page is designed to take users to another domain that provides Clickfix-style instructions to copy and execute commands into a terminal app, and deploys Atomic Stealer malware.

Note that similar campaigns previously utilized previously malicious sponsored Google ads to distribute multi-stage droppers via fake GitHub repositories that can detect virtual machines or analytics environments.

In recent weeks, threat actors have been discovered to be leveraging public Github repositories to host malicious payloads and distribute them via Amadey, and have used a hanging committee that corresponds to the official Github repositories to redirect immature users to malicious programs.

See also  Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Share This Article
Twitter Copy Link
Previous Article The strange ancient is the perfect sequel that sparked my witch's heart The strange ancient is the perfect sequel that sparked my witch’s heart
Next Article Thousands of people evacuated in Hong Kong after the discovery of a massive World War II bomb Thousands of people evacuated in Hong Kong after the discovery of a massive World War II bomb

Latest News

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

The North Korean threat actors behind the Contagious Interview campaign…

November 29, 2025

You Might Also Like

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Technology

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer

4 Min Read
Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack
Technology

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

7 Min Read
The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Technology

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

4 Min Read
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up
Technology

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?