InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Technology

LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

September 20, 2025 2 Min Read
Share
LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
SHARE

LastPass warns of a continuous and widespread information steeler campaign targeting Apple MacOS users via fake GitHub repositories that distribute malware-covered programs pose as legitimate tools.

“In the case of LastPass, the fraudulent repository redirected potential victims to a repository that downloads Atomic Infostealer malware,” researchers Alex Cox, Mike Kosak and Stephanie Schneider said from LastPass’ Threat Intelligence, Mitigation and Escalization (Time) team.

Beyond the last pass, popular tools that impersonate campaigns include 1Password, Basecamp, Dropbox, Gemini, Hootsuite, Concepts, Obsidian, Robinhood, Salesloft, Sentinelone, Shopifififififififififififififififififififififide, Thunderbird, Tweetdeck, and more. All GIHUB repositories are designed to target MacOS systems.

The attack includes the use of search engine optimization (SEO) addiction, pushing a link to the malicious Github site above in Bing and Google search results, clicking the “Install LastPass on MacBook” button to download the program, and redirecting the GitHub page domain.

“Github pages are created with multiple Github usernames and appear to avoid Takedowns,” says LastPass.

The GitHub page is designed to take users to another domain that provides Clickfix-style instructions to copy and execute commands into a terminal app, and deploys Atomic Stealer malware.

Note that similar campaigns previously utilized previously malicious sponsored Google ads to distribute multi-stage droppers via fake GitHub repositories that can detect virtual machines or analytics environments.

In recent weeks, threat actors have been discovered to be leveraging public Github repositories to host malicious payloads and distribute them via Amadey, and have used a hanging committee that corresponds to the official Github repositories to redirect immature users to malicious programs.

See also  North Korean hacker lures defense engineer with fake job to steal drone secrets
Share This Article
Twitter Copy Link
Previous Article The strange ancient is the perfect sequel that sparked my witch's heart The strange ancient is the perfect sequel that sparked my witch’s heart
Next Article Thousands of people evacuated in Hong Kong after the discovery of a massive World War II bomb Thousands of people evacuated in Hong Kong after the discovery of a massive World War II bomb

Latest News

React2Shell critical flaw added to CISA KEV after active exploitation

React2Shell critical flaw added to CISA KEV after active exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday…

December 7, 2025
Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

More than 30 security vulnerabilities have been uncovered in various…

December 6, 2025
Zero-click agent browser attack could delete entire Google Drive using crafted email

Zero-click agent browser attack could delete entire Google Drive using crafted email

New agent browser attack targeting Perplexity's Comet browser. A seemingly…

December 5, 2025
Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025

You Might Also Like

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Technology

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

5 Min Read
One click allows you to turn Perplexity's Comet AI Browser into Data Thief
Technology

One click allows you to turn Perplexity’s Comet AI Browser into Data Thief

3 Min Read
Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Technology

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

2 Min Read
Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
Technology

Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?