When looking for a reliable tool to protect your passwords, the last thing you expect is to fall into a trap designed to steal your data. But that’s exactly what’s happening. LastPass has issued a warning about a new campaign targeting macOS users, where cybercriminals impersonate password managers and other popular programs to spread malware.
At TecnetOne, we’ll explain how this threat works, which software is being faked, and what steps you can take to avoid becoming a victim.
Attackers are creating fraudulent GitHub repositories that look official. They host supposed versions of well-known apps, but what they actually deliver is a malware called Atomic Stealer (AMOS).
This malicious tool is part of a Malware-as-a-Service (MaaS) operation, available on underground forums for $1,000/month. Its main goal is to steal sensitive data from infected machines—including login credentials, cookies, browsing history, and even cryptocurrency wallet details.
The campaign uses search engine optimization (SEO) techniques to push these fake repositories to the top of Google or Bing results, increasing the chances of luring victims.
Malicious Google Search result (Source: LastPass)
The attack follows a method known as ClickFix, where users are tricked into running a command in macOS Terminal without understanding its consequences.
Here’s how it happens:
That command silently uses curl to download a malicious install.sh file into your /tmp folder. Once executed, AMOS installs itself and starts exfiltrating your data.
Read more: NimDoor: Malware for macOS that reinstalls itself after being removed
The campaign doesn’t stop at LastPass. According to the report, attackers have created fake versions of over 100 applications, including:
Everything appears legitimate—GitHub pages, branding, and installation instructions—all designed to build trust.
GitHub repository claiming affiliation with LastPass (Source: LastPass)
While Atomic Stealer was already known in cybersecurity circles, its developers recently added a persistent backdoor—making it even more dangerous.
Not only does it steal your data, but it also gives attackers ongoing, stealthy access to your Mac. They can install more malware or use your device as a launchpad for broader attacks.
Page hosting the ClickFix instructions (Source: LastPass)
ClickFix-style attacks on macOS aren't new. Past campaigns used fake ads to promote bogus solutions to system errors or impersonated legitimate brands like Booking.com.
What makes this campaign stand out is its scale and execution: over 100 programs spoofed and a well-executed SEO strategy to reach thousands of users.
Learn more: North Korean Hackers Use Deepfakes on Zoom to Infect Macs
At TecnetOne, we always stress: prevention is your first line of defense. Here’s what you can do:
If you ever copied a Terminal command from a suspicious GitHub page, here’s what to do:
Cybercriminals are getting more creative and opportunistic. This campaign combines SEO manipulation, fake GitHub repositories, and Terminal-based installation—making it easy to fall for if you're not cautious.
At TecnetOne, we believe the best defense is digital awareness: learn to spot red flags, verify sources, and never run what you don’t understand.
The fake LastPass campaign (and more than 100 other apps) is a clear reminder that even Mac users aren’t immune. The idea that macOS is “safe by default” no longer holds up.
Cybersecurity isn’t about fear—it’s about smart prevention. If you follow best practices, you can enjoy the full power of your Mac without becoming an easy target.