Hackers exploit Google Ads and Claude.ai shared chats to distribute Mac malware

2 Sources

Share

A sophisticated malware campaign is targeting Mac users through sponsored Google search results for Claude AI. Attackers are leveraging legitimate Claude.ai shared chat features to distribute malicious Terminal commands disguised as official installation guides. The malware runs in memory to bypass detection and steals browser credentials and Keychain data.

Hackers Abuse Google Ads to Target Mac Users

A new malware campaign is exploiting Google Ads and Claude.ai's shared chat feature to distribute Mac malware to unsuspecting users. Security engineer Berk Albayrak from Trendyol Group discovered the attack after users searching for "Claude mac download" encountered sponsored links that appeared to lead to claude.ai but instead directed victims to malicious instructions

1

. What makes this campaign particularly deceptive is that hackers abuse Google Ads by pointing to Anthropic's legitimate domain rather than fake lookalike sites, making the threat nearly impossible to spot at first glance.

Source: BleepingComputer

Source: BleepingComputer

The attackers are hosting their malicious instructions inside Claude.ai's own shared chat feature, presenting fabricated installation guides attributed to "Apple Support." These guides walk users through opening Terminal and pasting commands that silently download and execute malware on their Mac

1

. BleepingComputer identified a second shared Claude chat carrying out the same attack through entirely separate infrastructure, suggesting this is a coordinated malware campaign with multiple operators

1

.

Malware Hiding in Google Search Ads Runs Entirely in Memory

The malicious Terminal commands download encoded shell scripts from attacker-controlled domains. These scripts run entirely in the computer's memory, leaving little trace on disk and helping the malware bypass detection by traditional security tools

2

. One variant identified by researchers starts by checking whether the machine has Russian or CIS-region keyboard input sources configured. If detected, the script exits without doing anything, sending a quiet "cis_blocked" status ping to the attacker's server

1

.

Before proceeding with payload delivery, the script collects the victim's external IP address, hostname, OS version, and keyboard locale, sending all of it back to the attacker. This victim profiling before payload delivery suggests the operators are being selective about who they target

1

. The script then pulls down a second-stage payload and runs it through osascript, macOS's built-in scripting engine, giving the attacker remote code execution without ever dropping a traditional application or binary.

Infostealer Malware Harvests Credentials and Keychain Data

The final payload has been identified as a variant of the MacSync infostealer malware. It harvests browser credentials, cookies, and macOS Keychain contents, packages them up, and exfiltrates them to the attacker's server

1

. This type of infostealer malware poses significant risks to both individual users and organizations, as stolen credentials can be used for account takeovers, financial fraud, or further network infiltration.

This isn't the first time attackers have weaponized AI platform features. In December, BleepingComputer reported a similar campaign targeting ChatGPT and Grok users through their shared chat features

1

. The tactic represents an evolution in malvertising, where instead of creating fake domains, threat actors exploit the shared chat feature of legitimate platforms to host their malicious instructions behind trusted URLs.

Protecting Yourself from Malicious Ads and Sponsored Links

Users should navigate directly to official sources like claude.ai for downloading native apps rather than clicking sponsored links in search results

1

. The legitimate Claude Code CLI is available through Anthropic's official documentation and does not require pasting Terminal commands from a chat interface. Security experts recommend treating any instructions asking you to paste commands with extreme caution, regardless of where those instructions appear to come from.

Source: MakeUseOf

Source: MakeUseOf

Using ad blockers can provide an additional layer of protection against malware hiding in search results

2

. Most ad blockers offer allowlist functionality, enabling users to block malicious ads while still supporting trusted websites. Some browsers like Opera even come with built-in ad blocking systems. For Android users, changing DNS settings can help block ads and other malicious content

2

. As malvertising campaigns continue to evolve and target users searching for popular software, vigilance when interacting with sponsored search results remains critical for maintaining device security.

Today's Top Stories

TheOutpost.ai

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Instagram logo
LinkedIn logo
Youtube logo
© 2026 TheOutpost.AI All rights reserved