New macOS Malware Campaign Exploits Script Editor

Attackers leverage Apple's own tools to bypass defenses and deploy Atomic Stealer malware

Apr. 11, 2026 at 9:54am

A highly detailed, 3D macro illustration of a macOS Script Editor application interface, with various components and interfaces illuminated by neon cyan and magenta lights, conveying a sense of the digital infrastructure being exploited by malware.As macOS tools become targets for malware, a glowing, cybernetic visualization of the Script Editor application highlights the evolving threats to user security.Louisville Today

A new malware campaign targeting macOS users is exploiting the built-in Script Editor application to silently download and execute the Atomic Stealer (AMOS) malware. Attackers are crafting fake Apple-themed websites that masquerade as guides to free up disk space, using social engineering tactics to lure unsuspecting users into triggering the malicious script. This multi-stage attack bypasses traditional security measures and allows the malware to pilfer sensitive data like credentials, browser information, and cryptocurrency wallet details.

Why it matters

This campaign highlights the growing sophistication of macOS malware, which is now leveraging trusted system tools to bypass defenses. The abuse of Script Editor, a legitimate productivity application, demonstrates how attackers can exploit user trust in built-in software. The ability to silently execute malicious code without requiring manual command execution is a significant leap in attack complexity, making it easier for cybercriminals to compromise systems.

The details

The malware campaign works by using the applescript:// URL scheme to launch Script Editor directly with pre-loaded malicious code. This avoids the need for users to manually copy-paste commands in the Terminal, lowering the barrier for successful infection. The attackers are creating fake Apple-themed websites that appear to offer helpful guides for freeing up disk space, preying on common user concerns to lure victims into clicking the malicious links. Once triggered, the script downloads and runs Atomic Stealer (AMOS), a well-established malware-as-a-service that can steal a wide range of sensitive data, including credentials, browser information, and cryptocurrency wallet details. AMOS also includes a backdoor component, allowing for persistent access to compromised systems.

  • The malware campaign was first detected in April 2026.

The players

Atomic Stealer (AMOS)

A versatile malware-as-a-service that can steal sensitive data like credentials, browser information, and cryptocurrency wallet details. AMOS also includes a backdoor component for persistent access to compromised systems.

Got photos? Submit your photos here. ›

What they’re saying

“It's a chilling thought, isn't it? The very tools Apple provides to help us manage our Macs are being twisted into weapons against us.”

— Allyn Kozey, Cybersecurity Analyst

“This entire situation underscores a broader trend: as operating systems become more sophisticated, so too do the methods employed by those who seek to exploit them. The line between helpful tools and potential threats is becoming increasingly blurred, demanding a heightened level of vigilance from all of us.”

— Allyn Kozey, Cybersecurity Analyst

What’s next

Cybersecurity experts and Apple are working to identify and mitigate the vulnerabilities exploited in this campaign. Users are advised to exercise caution when prompted by Script Editor and to rely on official Apple documentation and support channels for troubleshooting.

The takeaway

This macOS malware campaign demonstrates the evolving tactics of cybercriminals, who are increasingly targeting trusted system tools to bypass traditional security measures. It underscores the need for heightened user vigilance and the importance of staying up-to-date with the latest security best practices, as the line between helpful applications and potential threats continues to blur.