- Today
- Holidays
- Birthdays
- Reminders
- Cities
- Atlanta
- Austin
- Baltimore
- Berwyn
- Beverly Hills
- Birmingham
- Boston
- Brooklyn
- Buffalo
- Charlotte
- Chicago
- Cincinnati
- Cleveland
- Columbus
- Dallas
- Denver
- Detroit
- Fort Worth
- Houston
- Indianapolis
- Knoxville
- Las Vegas
- Los Angeles
- Louisville
- Madison
- Memphis
- Miami
- Milwaukee
- Minneapolis
- Nashville
- New Orleans
- New York
- Omaha
- Orlando
- Philadelphia
- Phoenix
- Pittsburgh
- Portland
- Raleigh
- Richmond
- Rutherford
- Sacramento
- Salt Lake City
- San Antonio
- San Diego
- San Francisco
- San Jose
- Seattle
- Tampa
- Tucson
- Washington
New macOS Malware Campaign Exploits Script Editor
Attackers leverage Apple's own tools to bypass defenses and deploy Atomic Stealer malware
Apr. 11, 2026 at 9:54am
Got story updates? Submit your updates here. ›
As macOS tools become targets for malware, a glowing, cybernetic visualization of the Script Editor application highlights the evolving threats to user security.Louisville TodayA new malware campaign targeting macOS users is exploiting the built-in Script Editor application to silently download and execute the Atomic Stealer (AMOS) malware. Attackers are crafting fake Apple-themed websites that masquerade as guides to free up disk space, using social engineering tactics to lure unsuspecting users into triggering the malicious script. This multi-stage attack bypasses traditional security measures and allows the malware to pilfer sensitive data like credentials, browser information, and cryptocurrency wallet details.
Why it matters
This campaign highlights the growing sophistication of macOS malware, which is now leveraging trusted system tools to bypass defenses. The abuse of Script Editor, a legitimate productivity application, demonstrates how attackers can exploit user trust in built-in software. The ability to silently execute malicious code without requiring manual command execution is a significant leap in attack complexity, making it easier for cybercriminals to compromise systems.
The details
The malware campaign works by using the applescript:// URL scheme to launch Script Editor directly with pre-loaded malicious code. This avoids the need for users to manually copy-paste commands in the Terminal, lowering the barrier for successful infection. The attackers are creating fake Apple-themed websites that appear to offer helpful guides for freeing up disk space, preying on common user concerns to lure victims into clicking the malicious links. Once triggered, the script downloads and runs Atomic Stealer (AMOS), a well-established malware-as-a-service that can steal a wide range of sensitive data, including credentials, browser information, and cryptocurrency wallet details. AMOS also includes a backdoor component, allowing for persistent access to compromised systems.
- The malware campaign was first detected in April 2026.
The players
Atomic Stealer (AMOS)
A versatile malware-as-a-service that can steal sensitive data like credentials, browser information, and cryptocurrency wallet details. AMOS also includes a backdoor component for persistent access to compromised systems.
What they’re saying
“It's a chilling thought, isn't it? The very tools Apple provides to help us manage our Macs are being twisted into weapons against us.”
— Allyn Kozey, Cybersecurity Analyst
“This entire situation underscores a broader trend: as operating systems become more sophisticated, so too do the methods employed by those who seek to exploit them. The line between helpful tools and potential threats is becoming increasingly blurred, demanding a heightened level of vigilance from all of us.”
— Allyn Kozey, Cybersecurity Analyst
What’s next
Cybersecurity experts and Apple are working to identify and mitigate the vulnerabilities exploited in this campaign. Users are advised to exercise caution when prompted by Script Editor and to rely on official Apple documentation and support channels for troubleshooting.
The takeaway
This macOS malware campaign demonstrates the evolving tactics of cybercriminals, who are increasingly targeting trusted system tools to bypass traditional security measures. It underscores the need for heightened user vigilance and the importance of staying up-to-date with the latest security best practices, as the line between helpful applications and potential threats continues to blur.
Louisville top stories
Louisville events
Apr. 11, 2026
Disney On Ice presents Mickey's Search PartyApr. 11, 2026
Disney On Ice presents Mickey's Search Party




