AI Apps Become the New Malware Highway: What Mac Users Need to Know

Page content

AI Apps Become the New Malware Highway: What Mac Users Need to Know

I’ve been watching something troubling unfold over the past few weeks, and it’s time we talk about how cybercriminals are weaponizing our enthusiasm for AI tools. The latest campaigns targeting both Windows and Mac users show a sophisticated shift in attack vectors that caught my attention – and should be on your radar too.

The AI App Trojan Horse

Here’s what’s happening: The AMOS infostealer is now targeting macOS users through popular AI applications, essentially turning our excitement about AI productivity tools into a security vulnerability. This isn’t just another malware campaign – it’s a calculated exploitation of user behavior and trust.

What makes this particularly clever is how AMOS operators are distributing their payload through AI app marketplaces and extensions. Think about it: when someone downloads an AI writing assistant or image generator, they’re already in a mindset of trying something new and potentially giving it broad permissions to “enhance productivity.” That psychological state makes users more likely to click through security warnings or grant elevated privileges.

The credentials harvested from these infections aren’t just sitting in some hacker’s database either. According to the research from Flare, this data feeds directly into the broader stealer-log cybercrime economy – essentially a marketplace where your stolen credentials get sold and resold to other threat actors.

Nation-State Actors Join the AI Lure Game

But AMOS isn’t operating in isolation. We’re seeing North Korea-linked UNC1069 using similar AI-themed lures to target cryptocurrency organizations. This group is running a more sophisticated operation that combines several attack vectors: compromised Telegram accounts, fake Zoom meetings, ClickFix infection techniques, and AI-generated content.

The cryptocurrency focus makes sense from their perspective – these organizations often have high-value digital assets and may have less mature security programs compared to traditional financial institutions. The social engineering component is particularly noteworthy because it shows how these groups are adapting their tactics to current communication patterns and trust relationships.

The Forgotten Attack Surface

While we’re all focused on these high-profile AI-themed attacks, I want to highlight something that’s been nagging at me: our printer security is still a mess. I know, I know – printers aren’t as exciting as AI malware, but hear me out.

The article from Dark Reading hits on something we’ve all experienced: the “ownership vacuum” around printer management. These devices sit on our networks with default credentials, outdated firmware, and minimal monitoring. Meanwhile, they have access to everything that flows through them – contracts, financial documents, personal information. Yet somehow they rarely make it into our endpoint protection strategies with the same rigor as laptops and servers.

Old Tricks, New Exploits

Speaking of things that should be on our radar, APT28 is back to exploiting RTF documents, this time using CVE-2026-21509. RTF attacks feel almost nostalgic at this point, but they keep working because people still open email attachments, and these file formats often bypass modern security controls that focus on more common threats.

The persistence of RTF-based attacks reminds me why we can’t just focus on the shiny new threats. Sometimes the most effective attacks use techniques that are five or ten years old, precisely because we’ve shifted our attention elsewhere.

What This Means for Our Defense Strategy

The common thread I’m seeing across these incidents is the exploitation of trust and routine behavior. Whether it’s downloading an AI app that promises to boost productivity, joining a Zoom meeting that seems legitimate, or opening a document that appears work-related, these attacks succeed because they fit into normal user workflows.

We need to adjust our security awareness training to address these specific scenarios. It’s not enough to tell users “be careful with email attachments” when they’re being targeted through app marketplaces and communication platforms they use daily.

For Mac users specifically, the AMOS campaign should serve as a wake-up call that macOS isn’t immune to sophisticated malware campaigns. The days of “Macs don’t get viruses” are long gone, and our security programs need to reflect that reality.

I’m also thinking we need better visibility into what applications our users are installing, especially AI-related tools that might request broad system permissions. This doesn’t mean blocking everything, but rather having the conversation about risk versus productivity benefit before the installation happens, not after the credential theft.

The printer issue requires a different approach entirely – we need to treat these devices as the network endpoints they actually are, with proper asset management, regular updates, and monitoring.

Sources