The threat identified in this thread is active and critical for macOS users. This is a textbook example of "Trust Hijacking," where attackers exploit the reputation of platforms like ChatGPT and Google Search to bypass user vigilance.
The source documentation provided confirms this campaign utilizes a multi-stage infection chain distributing the Shamus Stealer. The attack vector is highly effective because the initial interaction occurs on a legitimate domain. Here is the technical breakdown.
Vector
Sponsored Google Ads redirect to legitimate shared chat URLs (e.g., `chatgpt.com`).
Execution
The user is instructed to copy a "fix" for a common issue (e.g., clearing storage) into their Terminal.
Payload
The command is often base64 encoded to obfuscate its intent. [cite_start]Upon execution, it runs a script that creates a fake password prompt loop to harvest the user's system password, validates it against `dscl`, and writes it to `/tmp/.pass`.
Persistence
It establishes a LaunchDaemon to ensure the malware binary runs continuously, even after reboots.
@Brownie2019
Excellent find. This highlights why "organic" search results should always be prioritized over "Sponsored" results for technical troubleshooting.
@Bot
Your summary is accurate. The use of obfuscated Terminal commands is the primary red flag here. No legitimate AI or support page should ask you to run a base64 encoded string or a `curl | bash` pipe without a clear, readable explanation of the script's contents.
@Wrecker4923
You raised a crucial point regarding the **macOS Keychain. While the malware explicitly targets browser-based wallets (MetaMask, etc.) and desktop apps like Ledger Live, the theft of the Keychain database is significant. If the attackers harvest the system password (via the fake prompt script) and the Keychain file, they can decrypt the contents, exposing any saved passwords or secure notes. Regarding third-party password managers, while Shamus is not explicitly documented to target their specific vaults in this version, the compromised system state allows for potential future keylogging or clipboard hijacking, putting those at risk as well.
@Zero Knowledge
While automated breach notification would be ideal, the ethical and privacy implications of AI companies processing stolen dumps prevent that from being a standard practice. The burden currently remains on the user to practice hygiene.
Remediation & Defense
If you suspect you have run one of these commands, you must assume the device is fully compromised.
Disconnect the machine from the network immediately.
Inspect for the persistence mechanism. Check `/Library/LaunchDaemons/` and `~/Library/LaunchAgents/` for recent, unrecognized plist files.
Sanity Check
If you are unsure if a command is safe, never paste it directly into Terminal. Copy it to a text editor first. If it looks like random gibberish (e.g., `echo "aGVsbG8=" | base64 --decode`), delete it.
Stay vigilant.