More Mac malware from Google search

(eclecticlight.co)

148 points | by kristianp 10 hours ago ago

95 comments

  • emilecantin 5 hours ago

    Attacks like this are not helped by the increasingly-common "curl | bash" installation instructions (e.g. the new "native" Claude Code install)...

    Publish through homebrew like a civilized person, please!

    • steve1977 6 minutes ago

      A civilized person of course would use either MacPorts or a proper native macOS installer package.

    • skybrian 4 hours ago

      I will never use Homebrew again because I'm still sore that they dropped support for a Mac OS version that I was still using and couldn't upgrade because Apple didn't support my hardware anymore.

      Any decent project should have a way to install without Homebrew. It's really not necessary.

      • nonethewiser 3 hours ago

        I guess I ran into the same thing. I try to install anything with Homebrew and it takes forever then breaks.

      • wookmaster 3 hours ago

        Seems reasonable to not support an OS apple doesn’t support anymore

    • fouc 4 hours ago

      I wish mac users would stop using homebrew and use a real package manager with actual dependency management.

      At the very least, replace homebrew with something like devbox which has `devbox global` for globally managing packages, it uses nix under the hood, and it's probably the simplest most direct replacement for homebrew.

      • skybrian an hour ago

        It's not necessary because Mac applications shouldn't have any dependencies other than the OS. (Whatever additional libraries they use should be included.) This should also be true of basic developer tools. Once you're in a particular ecosystem, tools like deno, npm, or uv can handle their own dependencies.

        Alternatively, you could do development in a container and use apt-get there. That's probably safest now that we're using coding agents.

      • AnonC 3 hours ago

        I use MacPorts because of older versions of Homebrew having a weird and insecure design. [1] I think some of those design issues may have been fixed, but I’m wary of Homebrew.

        [1]: https://saagarjha.com/blog/2019/04/26/thoughts-on-macos-pack...

      • pram 2 hours ago

        I don't agree this is an issue and I'll tell you why: Homebrew isn't responsible for keeping the system functional like apt or pacman, it's a supplemental thing. I've also found it's useful in this capacity on Linux specifically with LTS distros, I can get the latest fzf or zoxide or whatever without having to add some shady repo.

      • TheDong 2 hours ago

        I wish the mac users would switch to a real OS, linux, so that software companies would release linux versions of stuff first.

        Codex, Claude Desktop, etc etc all starting out as "macOS exclusive" feels so silly when they're targeting programmers. Linux is the only OS a programmer can actually patch and contribute to, and yet somehow we've got a huge number of developers who don't care about having a good package manager, don't care about being able to modify their kernel, don't care about their freedom to access and edit the code of the software they rely on to work...

        It's depressing how much of the software industry is just people on macbooks using homebrew to install a newer version of bash and paying $5 for "magnet" to snap windows to the corners since their OS holds them in a prison where they can't simply build themselves a tiling window manager in a weekend.

        The OS is core to your tools and workflows, and using macOS cedes your right to understand, edit, and improve your OS and workflows to a company that is actively hostile to open source, and more and more hostile to users (with a significant increase in ads and overly priced paid services over the years).

        Anyway, yeah, homebrew sucks. At least nix works on macOS now so there's an okay package manager there, but frankly support for macOS has been a huge drag of resources on the nix ecosystem, and I wish macOS would die off in the programming ecosystem so nix could ditch it.

        • fouc 2 hours ago

          I'd say support for linux has improved an incredible amount compared to 5-10 years ago. I'm often pleasantly surprised when ever a linux version of something is available because I'm used to not expecting that haha.

    • krackers 4 hours ago

      That wouldn't really help, it could be more naughty and use pastejacking so you don't even realize what's happening. That might end up catching a lot of people because as far as i know by default bash doesn't use bracketed paste, so you think you're copying a real command and it ends up sending your secrets before you know what happened.

      Disabling JS + bracketed paste seems to be the only good solution.

      Btw OP article uses a weird setup, why would they use `bash -c "$(curl $(echo qux | base64))"` instead of just "curl | bash"

    • gchamonlive 4 hours ago

      Maybe tools like https://github.com/vet-run/vet could help with these projects that would rather you use their custom install script instead of complying to distro-specific supply chains.

    • donatj 4 hours ago

      A homebrew tap is really a lateral move from a safety perspective and still usually invoked by pasting into the command line.

    • retired 4 hours ago

      Homebrew also installs through curl | bash but since recent they also offer a .pkg installer.

    • root_axis 4 hours ago

      It's not really any different than downloading a binary from a website, which we've been doing for 30 years. Ultimately, it all comes down to trusting the source.

      • AdieuToLogic 3 hours ago

        >> Attacks like this are not helped by the increasingly-common "curl | bash" installation instructions ...

        > It's not really any different than downloading a binary from a website, which we've been doing for 30 years.

        The two are very different, even though some ecosystems (such as PHP) have used the "curl | bash" idiom for about the same amount of time. Specifically, binary downloads from reputable sites have separately published hashes (MD5, SHA, etc.) to confirm what is being retrieved along with other mechanisms to certify the source of the binaries.

      • idle_zealot 3 hours ago

        Which is why package managers with well-maintained repositories are the civilized solution to software disruption. Unfortunately the Linux world has been dedicating a lot of energy to making Windows-style "download and run the exe" possible on Linux.

        • gruez 3 hours ago

          >Which is why package managers with well-maintained repositories are the civilized solution to software disruption.

          How does that model work with distros like debian, where they freeze package versions and you might not get claude code until 2027 (or whenever the next release is)?

        • nubinetwork 3 hours ago

          I've heard this time and time again from new Linux users: "I don't want to learn the command line, I just want to be able to install and run whatever I want"

    • sfbapt 3 hours ago

      What's the security benefits of using homebrew? Isn't it just another layer of redirection before downloading the software?

    • what 4 hours ago

      As if homebrew is any more secure. The only reason to use homebrew is convenience.

    • isodev 5 hours ago

      And donate to Homebrew, like a civilised person

    • bugbuddy 4 hours ago

      Meanwhile, homebrew install instructions:

      /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/inst...)"

      Then it prompts user for admin previledges. Also, it does not support installing as a local non-admin user.

      • rvz 3 hours ago

        I would agree if it was the only way to install Homebrew, but it is not.

        You can install it via a .pkg here: [0]

        [0] https://github.com/Homebrew/brew/releases/tag/5.0.13

      • brigandish 2 hours ago

        Does it still do the "you can't install via sudo, that's a security risk" while not allowing a non-admin install? I laugh and I cry.

        Why does anyone trust that project to understand security?

  • b1temy 4 hours ago

    > Never follow a shortened link without expanding it using a utility like Link Unshortener from the App Store,

    I am unfamiliar with the Apple ecosystem, but is there anything special about this specific app that makes it trustworthy (e.g: reputable dev, made by Apple, etc.)? Looking it up, it seems like an $8 app for a link unshortener app.

    In any case, there have been malicious sites that return different results based on the headers (e.g: user agent. If it is downloaded via a user-agent of a web browser, return a benign script, if it is curl, return the malicious script). But I suppose this wouldn't be a problem if you directly inspect and use the unshortened link.

    > Terminal isn’t intended to be a place for the innocent to paste obfuscated commands

    Tale as old as time. Isn't there an attack that was starting to get popular last year on Windows of a "captcha" asking you to hit Super + R, and pasting a command to "verify" your captcha? But I suppose this type of attack has been going on for a long, long, time. I remember Facebook and some other websites used to have a big warning in the developer console, asking not to paste scripts users found online there, as they are likely scams and will not do what they claim the script would do.

    ---

    Side-Note: Is the layout of the website confusing for anyone else? Without borders on the image, (and the image being the same width of the paragraph text) it seemed like part of the page, and I found myself trying to select text on the image, and briefly wondering why I could not do so. Turning on my Dark Reader extension helped a little bit, since the screenshots were on a white background, but it still felt a bit jarring.

  • ALLTaken 2 hours ago

    DO NOT GOOGLE EXPRESS VPN!

    The GitHub links are one of the nastiest Malware I ever encountered in my life!

    I steals your Apple Keychain, all your "Safe" Passkeys, your Google Chrome "Saved Passwords", even your KeePass Database!

    Login and security is still not sufficiently solved with attack-proofs for the most important things in life like your Bank, Email, Wallets, Social Logins.

    Your "logged-in Sessions" also get stolen! It's unbearable that most cookies expire in months "ON THE SERVER SIDE"! You have no control and can't log the attacker out!

    It happened to me, when I was in China and searched for ExpressVPN, because the main website didn't load forever, the GitHub link seemed like an alternative.. damn.. I changed my Google Password 5 times and the attacker was still able to log-in, it was so devastating! I had to change my email passwords multiple times too.

    Sessions are what make logins valid and this is the weakest link of all. I wish Sessions used Off-The-Record encryption with One-Time-Pads, such that each acccess requires a new key, that can only be derived with a valid reply that makes safe that the attacker can be logged out safely.

    • GaryNumanVevo an hour ago

      Did you download anything? A bad link isn't going to do all of that, unless some NS actor is dropping zero days on random people via Google search. You most likely downloaded a trojan with a a luma stealer, and your computer is probably still compromised.

  • possibleworlds 2 hours ago

    I reported one of these recently. It was also related to clearing space, specifically system files. It was the second top sponsored link and presented as an Apple support page. The styling was very convincing, with the only giveaway being the url.

    A day later my parents called me very stressed out about a popup on my mother’s iPhone saying she had been hacked. I asked them to take a screenshot, and again it was a website that was styled to look like a modal on top of a iOS Settings app page. With the new ui this was extremely effective, as the page title is just a tiny thing down the bottom in scrolled state.

    I don’t know what is going on, but I’d assume the problem is AI moderation.

  • sgirard 2 hours ago

    I imagine that an AI agent like OpenClaw, if given browser access and system control with Peekaboo or similar could easily fall prey to this attack.

  • ProtectorFox 8 hours ago
  • aucisson_masque 8 hours ago

    At least macos has file access permissions.

    • p_ing 5 hours ago

      You're referring to [Sandboxing] Mandatory Access Controls [0]. Windows doesn't implement MAC in the same way, instead using Mandatory Integrity Controls [1].

      [0] https://developer.apple.com/library/archive/documentation/Se...

      [1] https://learn.microsoft.com/en-us/windows/win32/secauthz/man...

      Windows implements ACLs in a far more granular way than macOS and most other Unicies, however (with the exception of Slowaris).

    • zx8080 7 hours ago

      Comparing to DOS or what? No one runs Win10/11 on FAT now, while NTFS has access permissions and ACLs.

      • retired 7 hours ago

        I remember that Win32 apps on Windows 10 and 11 can do whatever they want with the users personal files. Has that changed?

        • zx8080 2 hours ago

          In Win, access to files are controlled by ACL when NTFS is used (dating back to NT 3.1 with NTFS). So it depends on which user runs a process.

          Basic hygiene is very simple: never run as Administrator. Create and use a regular user or poweruser group user. It's similar to a regular linux practice. Use Administrator account when needed only.

    • tokyobreakfast 6 hours ago

      What does that even mean? NTFS file access permissions (35 years old at this point) are far more powerful than 1970s-era Unix permissions model.

      • emmelaich 6 hours ago

        It's referring to the fact that Terminal doesn't have free access to all your files and folders, despite what the traditional file access perms say.

        • tokyobreakfast 4 hours ago

          Windows has this too, but it's off by default. I forgot what it's called, that's how often it gets used.

      • tcoff91 6 hours ago

        He’s talking about sandboxing and permissions prompts

  • aussieguy1234 3 hours ago

    Could the dataset of the LLMs that made these recommendations have been poisoned by, let's say, a Honeypot website specifically designed to cause any LLM that trains on it to recommend malware?

  • TminusZ 3 hours ago

    Careful out there.

  • retired 8 hours ago

    Thanks for reminding me to turn off Full Disk Access for Terminal. I'm not sure why I had that one turned on.

    • latexr 8 hours ago

      Probably because you can’t even properly `ls` system directories without it.

      • frizlab 7 hours ago

        depends which directories…

    • al_borland 7 hours ago

      What would you do in the terminal without it?

    • LtWorf 7 hours ago

      Because it is useless without?

    • pkulak 7 hours ago

      lol, is this serious? The final straw with Mac for me was when I accidentally hit “No” when asked if I wanted to give my terminal access to the file system. All of a sudden I was starting my work day without a working terminal. Obviously there was a solution, probably an easy one, but I didn’t even look for it.

      • troad 5 hours ago

        > The final straw with Mac

        > Obviously there was a solution, probably an easy one, but I didn’t even look for it

        It's hard to take this seriously. It's the most obvious setting possible. Settings > Privacy & Security > Full Disk Access > tick the apps you want to have it.

        What's even the complaint here? That Mac has solid app permissions, but you can't be bothered to open the settings?

        • pkulak 4 hours ago

          I said it was likely an easy solution. Glad to see my intuition was correct!

          I also said it was the “final straw”. No worries at all if you’re not familiar with that expression. It means that there were lots of similar slights previously, and that the event I mentioned, while minor, was the one that finally pushed me to make the decision I made.

          • nozzlegear an hour ago

            > I also said it was the “final straw”. No worries at all if you’re not familiar with that expression. It means that there were lots of similar slights previously, and that the event I mentioned, while minor, was the one that finally pushed me to make the decision I made.

            This sort of patronizing assholery is childish and unbecoming. Your comment would've been better without it.

      • retired 7 hours ago

        The solution is to enable Full Disk Access in settings.

        • pkulak 4 hours ago

          Are you sure? This felt like it was specific to iTerm. Like I’d have to scroll a list of apps, find it, and modify what it’s allowed to access.

  • jeffbee 8 hours ago

    This sucks because the web should be the perfect, safe platform for this kind of application, but it isn't. Technically all the features exist in the browser such that you could write a homedir cleaner, space analyzer, etc purely in a browser tab, but because of the misguided (in my opinion) way that browsers refuse to do open a homedir, it's impossible.

    • digiown 8 hours ago

      I'm not sure letting a webapp access your home is a good idea. You're basically YOLOing random remote code to run on your machine. Maybe we can have it access some specific folder for its own data.

      And then there's also Apple which won't allow functional web apps, lest it affects their app store 30% cut.

      • trollbridge 6 hours ago

        Seems like a great idea for something to just run inside a chroot jail (or the modern equivalent, a container).

      • jeffbee 8 hours ago

        The web already has these APIs, it can be granted read-only permissions to designated directories. But the browsers will refuse to allow you to delegate even read-only access to, for example, the macos ~/Applications folder, on the pretty shaky basis of it being "system files". Because of that policy the API is not useful for the application of a space analyzer.

        • JumpCrisscross 4 hours ago

          > browsers will refuse to allow you to delegate even read-only access to, for example, the macos ~/Applications folder, on the pretty shaky basis of it being "system files"

          If you want to trash your system I believe nothing prevents you from giving Firefox full-disk access.

    • blackoil 2 hours ago

      Is this satire?

  • tolerance 6 hours ago

    Another reason to avoid Medium like cold grits.

  • tokyobreakfast 6 hours ago

    Are we still pushing the myth that anti-malware on Mac isn't necessary?

    • jtbayly 6 hours ago

      I support quite a few Mac users and never recommend it myself. Also own a couple Mac’s and don’t use it.

      I do occasionally use an app to clean somebody’s Mac of an irritating browser search hijack. I’ve never seen anything else.

      Why should I change my mind?

      • socalgal2 4 hours ago

        that sounds an awful lot like "I've been this club many times and I was never raped" or "I've walked down that alley many times and I've never been mugged" or "I speed all the time and I've never been in a car accident"

        • JumpCrisscross 4 hours ago

          > sounds an awful lot like "I've been this club many times and I was never raped" or "I've walked down that alley many times and I've never been mugged"

          I have been to many clubs many times and never suffered violence. I’ve also walked down alleys without concern. I did them in safe places where that wasn’t a material concern.

          Windows is Detroit. MacOS is Palo Alto. What’s good practice in one is wasteful or dangerous for the other.

    • GeekyBear 6 hours ago

      How does antivirus software protect users who paste malicious commands they find online into the terminal?

      • quamserena 6 hours ago

        By scanning downloaded binaries for known viruses?

        • GeekyBear 6 hours ago

          A text command pasted into the terminal isn't a binary.

          Convincing a Linux user to paste rm -rf / into the terminal is not malware. It's social engineering.

          Scanning binaries for known malware is already built into the OS.

          • wpm 5 hours ago

            Endpoint security software on the Mac, if it's worth the hit to system resources that is, inspect every call to exec and fork that occur in the kernel and also inspect those for known attack vectors, malicious scripts, etc. The one I have installed on my work Mac will kill reverse shell attempts before they are run. Will stop keychain attacks. Infostealing (as they can also get every file system op as they are happening in the kernel).

            Gatekeeper and Xprotect are good, but there's only so much they can do.

          • tokyobreakfast 4 hours ago

            > Scanning binaries for known malware is already built into the OS.

            Clearly it isn't. XProtect is a joke. It's 2004-era ClamAV level of protection.

          • sithadmin 6 hours ago

            The article specifically mentions that the methodology here is to trick users into running an obfuscated CLI command…that downloads and runs a binary

            • GeekyBear 5 hours ago

              Terminal commands have the ability to do dangerous things, like deleting all the user's files.

              In this case, the user is warned that the command wants to do something dangerous and must manually allow or deny the action.

    • eviks an hour ago

      No, we're using the built-in mac anti-malware app

    • blackoil 2 hours ago

      As of today you don't need to install one on Windows also. Both OS have inbuilt s/w for this purpose.

    • CharlesW 6 hours ago

      No, that narrative died around 2010. The existence of malware targeting Macs has driven many macOS security improvements since, many of which are taken personally by HN readers.

    • blackqueeriroh 2 hours ago

      What anti-malware would have stopped this, exactly?

    • LoganDark 6 hours ago

      XProtect (Apple's built-in antimalware) is usually all you need, as long as you're at least somewhat savvy (and sometimes even if you aren't). I believe installing any additional antimalware on a Mac is a waste of resources.

    • sneak 5 hours ago

      It is necessary. That’s why Apple ships a free invisible one bundled into the OS that you never have to think about, see, or update.

  • baxtr 8 hours ago

    Actually… I think this be solved by AI answers. I don’t look up commands on random websites, instead I ask an LLM for that kind of stuff. At the very least, check your commands with an LLMs.

    • goalieca 7 hours ago

      What we used to have, 15 years ago, was a really well functioning google. You could be lazy with your queries and still find what you wanted in the first two or three hits. Sometimes it was eerily accurate and figuring out what you were actually searching for. Modern google is just not there even with AI answers which is supposed to be infinitely better at natural language processing.

      • iamflimflam1 5 hours ago

        15 years ago there were fewer content farms trying to get your clicks.

        • somenameforme 3 hours ago

          I think that played a somewhat smaller role than Google seemingly gradually starting to take its position for granted and so everything became more focused on revenue generation and less focused on providing the highest quality experiences or results.

          Beyond result quality it's absurd that it took LLMs to get meaningful natural language search. Google could have been working on that for many years, even if in a comparably simple manner, but seemingly never even bothered to try, even though that was always obviously going to be the next big step in search.

      • macintux 6 hours ago

        Google was such a revelation after the misery of Alta Vista and kin. I miss the days when I liked them.

      • username223 3 hours ago

        We used to have an endless supply of new search engines, so "SEO" was not viable. Then Google got a monopoly on search, DoubleClick reverse-acquired Google, and here we are.

    • OsrsNeedsf2P 7 hours ago

      Yesterday I was debugging why on Windows, my Wifi would randomly disconnect every couple hours (whereas it worked on Linux). Claude decided it was a driver issue, and proceeded to download a driver update off a completely random website and told me to execute it.

      My point is, this is not solved by AI answers.

      • blackqueeriroh 2 hours ago

        Claude didn’t simply “proceed to download a driver update off a completely random website and told me to execute it”

        You had to disable permissions or approve some of that.

    • al_borland 7 hours ago

      Don’t the LLMs get their information from these random websites? They don’t know what is good and what is malware. Most of the time when I get an AI answer with a command in it, there is a reference to a random reddit post, or something similar.

    • Fnoord 5 hours ago

      LLMs will allow Mal to sneak in backdoors in the dataset. Most of the popular LLMs use some kind of blacklisting instead of a smaller specific/specialised dataset. The latter seems more akin to whitelisting.

    • JumpCrisscross 4 hours ago

      FTFA: “This is almost identical to the previous attack via ChatGPT.”

  • etrvic 8 hours ago

    A solution would be to stop shipping macs with the terminal app\s. Computers are now used by a wide variety of people, some without technical knowledge, maybe a default switch on macOS that displays warnings on rather trivial attacks would help.

    • dexterdog 3 hours ago

      How is that a solution? These attacks would just tell you to install terminal if you don't already have it.